ods

Results 51 - 75 of 651Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Infor     Published Date: Aug 04, 2011
AB World Foods has a highly complex supply chain, driven in part by the nature of its globally sourced and distributed products as well as by the demands of growth and acquisition. With Infor SCM Demand Planning, the company cut costs while also improving service levels.
Tags : 
infor, ab world food, scm, enterprise business software, customer relationship management, enterprise asset management, enterprise resource planning, financial management
    
Infor
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Adobe     Published Date: Nov 07, 2013
SPAR Austria Information and Communication Services taps powerful content management and publishing capabilities in Adobe Experience Manager to enhance digital marketing strategies
Tags : 
adobe, spar, business services, integrated online experiences, spar austria, leading food retail, household consumer goods, multichannel marketing strategy
    
Adobe
Published By: Pega     Published Date: Apr 04, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
    
Pega
Published By: Global Payments     Published Date: May 02, 2019
We live in an age of unrivaled ecommerce opportunity. The number of new internet users is climbing by 248 million each year, equating to 7% annual growth. That figure in turn is dwarfed by booming ecommerce rates, which average out at 14% globally. This report offers an overview of ecommerce markets across the globe, summarizing the current situation, and identifying the most effective ways to nurture business - and the customer experience - on a local and global scale.
Tags : 
ecommerce growth, global payments, local language, localization, retail, mobile payments, alternative payment methods, chinese wallets
    
Global Payments
Published By: Global Payments     Published Date: May 02, 2019
The economic face of the APAC region is changing. While the East has long been considered a source of competitively priced raw materials and manufacturing services, the spending power of its inhabitants - and their increased fondness for international travel - has transformed it into a force to be reckoned with. It’s estimated that, over the next five years, 88% of the growth in the global middle class will be in the Asia Pacific region.1 If multinational companies hope to take advantage of this vast new target market, they will need to adapt their expansion strategies and offer APAC customers a tailored retail experience.
Tags : 
apac growth, global payments, luxury brands, trusted payments, localized purchasing, retail, wechat pay, alipay
    
Global Payments
Published By: Global Payments     Published Date: May 02, 2019
China is becoming one of the most important markets for luxury goods in the world. The rise of the Chinese luxury consumer is bringing a world of opportunities to luxury retail giants across the globe. By 2025, it is expected that consumers in China will account for 44% of the $339 billion in luxury goods spending worldwide. This infographic highlights these projected luxury sales increases and identifies the primary drivers and the preferred payment methods for Chinese consumers.
Tags : 
luxury goods, global payments, unified commerce, retail, wechat pay, alipay, chinese wallets, global commerce
    
Global Payments
Published By: Global Payments     Published Date: May 02, 2019
In just a few decades we've gone from face-to-face, catalog and phone omnichannel: endless retail/multiple ways to buy and receive goods. That change has expolded sales.  Download this interesting Infographic to see more.
Tags : 
ecommerce, secure buying, global payments, automatic payments, online shopping, luxury goods, retail, wechat pay
    
Global Payments
Published By: Oracle     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
    
Oracle
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding
    
Vision Solutions
Published By: Salesforce Commerce Cloud     Published Date: Jul 12, 2016
96% of millennials say they still like to visit actual shops. They are also influenced more by online videos than TV advertising, and still rely on “official” reviews found in newspapers, magazines and online publications. If you want to be successful in this rapidly changing market, you need to attract millennials. Download this free research paper to find out how to attract millennials and adapt your methods to include them.
Tags : 
demandware, social, millennials, impressions, social media, social influence
    
Salesforce Commerce Cloud
Published By: UK Export Finance     Published Date: Feb 26, 2018
This guide explains how UK Export Finance can help you make sure your purchases of goods or services from the UK come with attractive terms of finance. The UK has a long tradition of innovation and excellence, and is the world’s sixth-largest exporter. With an open and friendly business environment, and expertise in sectors ranging from manufacturing and construction to services and technology, the UK is a trusted business partner to buyers around the world. Thanks to our flexible and competitive financing solutions, buying from the UK is more attractive than ever.
Tags : 
finance, government, international, trade, technology, services
    
UK Export Finance
Published By: ServiceNow     Published Date: Oct 18, 2013
Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.
Tags : 
configuration management, data certification, product management, servicenow, enterprise it cloud, it cloud company, infrastructure applications, management applications
    
ServiceNow
Published By: Hyland Software     Published Date: Jun 16, 2016
Fueled by new technologies, expanding regulations and greater patient expectations, there’s a clinical content gold rush in the healthcare market. Sources and types of clinical content grow at an exponential rate and through increasingly refined input methods, including voice and improved OCR, clinicians capture more unstructured information about their patients than ever before. Making all clinically relevant content available together, in one place seems like a simple request. Must the response be so complex?
Tags : 
healthcare, technology, solutions, best practices, business management, process management, analytics, content management
    
Hyland Software
Published By: EMC Converged Platforms     Published Date: Oct 22, 2015
Old Dutch Foods, known for its broad selection of snack foods in the midwest United States and Canada, was struggling to get the right products to the right places at the right time. Its data center included outdated physical servers, and batch processing meant that inventory would not be updated until the end of the day as opposed to real time. In addition, recovering from power outages and disk failures could frequently take up to two weeks. To modernize its data center, Old Dutch Foods invested in EMC Converged Infrastructure. The fast and easy deployment of two VCE VBlock® systems running JD Edwards, MS Exchange, mobile device apps, and operation of a backup site with replicated applications and data. This enhanced the IT department's responsiveness to the business, allowed them to shift to real-time inventory, and reduced CapEx and OpEx costs. Operations were simplified by reducing person-hours needed for infrastructure maintenance by 75 percent.
Tags : 
    
EMC Converged Platforms
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 01, 2019
It seems every business sector—automotive, aerospace and defense, heavy industry, consumer goods, even agriculture—wants “smarter” products that will be part of the Internet of Things (IoT) and form the basis for connected factories of the future. For engineering departments large and small, that means today’s design engineering teams are being asked to create more complex product designs, simulate more advanced mechanical and electrical phenomena, and virtually assemble components as part of larger systems—all in less time. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
    
Dell EMC
Published By: Zooz Payments     Published Date: Nov 27, 2015
This ebook explores the connectivity and integration costs of managing a wide range of preferred payment methods and guides you through the hidden consumer costs and foreign exchange fees.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems
    
Zooz Payments
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.