sas

Results 326 - 350 of 1265Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: May 24, 2018
Implementing omnichannel marketing is often difficult, especially when using digital channels. Most products designed for digital channels lack the ability to integrate with traditional channels that have on-site processes and data. SAS Customer Intelligence 360 enables businesses to use both cloud and on-site channels and data. This integration is possible because of SAS software’s hybrid cloud architecture.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 19, 2018
We are offering this second edition resource as a business oriented, working guide to core data management practices. In this ebook you will find easy to digest resources on the value and importance of data preparation, data governance, data integration, data quality, data federation, streaming data, and master data management.
Tags : 
    
SAS
Published By: SAS     Published Date: May 09, 2019
This white paper explains why insurers should be taking action now to prepare for the new requirements, and what to look for in an IFRS 17 solution.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 05, 2019
Organizations are charging ahead with investments in cloud and analytics to deliver agility, scalability and cost savings. With computing power advancements and continuous growth of data, cloud provides the elastic workloads and flexibility required for modern business. However, the environment of flexibility and choice that cloud provides also creates complexity and challenges. In this white paper, learn how organizations are applying expertise and using the latest methods to move analytics to the cloud, including: • Why are organizations moving analytic work to the cloud? • What are the key challenges and misconceptions? • How do IT leaders provide choice while maintaining control?
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. • A data scientist in the business development team analyzes data to create customized • experiences for premium customers. • A digital marketer tracks and influences the customer journey for prospective • mortgage customers. • A risk analyst builds risk models for the bank’s loan portfolios. • A data analyst examines data about local customers. • A technical architect defines a new system to protect bank data from internal and • external cyberthreats. • An application developer builds a new mobile app for online customer portfolio • management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 05, 2019
Impending IFRS 17 regulation will overhaul accounting standards for insurers, primarily in the European Union, Asia, Latin America and Canada. Greater detail, transparency and comparability will give analysts and investors more insight into a company’s financial health than ever before. For most insurers, the transition to IFRS 17 will have a visible impact on financial statements and key performance indicators – and not in a good way. Implementing the IT architecture for it will be a serious undertaking. This white paper explains why insurers should be taking action now to prepare for the new requirements, and what to look for in an IFRS 17 solution.
Tags : 
    
SAS
Published By: Aberdeen Group     Published Date: Jun 02, 2011
The focus of this document is to quantify the cost of IT-induced business downtime.
Tags : 
aberdeen, datacenter uptime, roi, disaster recovery, best-in-class, industry average, laggard, sla, service level agreement, business continuity, business interruptions, cost of downtime, data protection
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jun 02, 2011
Aberdeen has ascertained that companies that backup critical data and systems at remote locations have a faster recovery time from computer-generated business interruptions.
Tags : 
aberdeen, disaster recovery, business disruption, remote data storage, data archiving, data protection
    
Aberdeen Group
Published By: Dell Storage     Published Date: Apr 21, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware, maximizes system performance and efficiency, accelerates storage provisioning, simplifies resource management and streamlines disaster recovery.
Tags : 
dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Oct 17, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 02, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware and maximizes system performance and efficiency.
Tags : 
dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery
    
Dell Storage
Published By: WatchGuard     Published Date: Oct 17, 2012
The Cisco ASAs and point solutions were not cutting it. The 3-person IT team needed a solid multi-layered solution that was easy to manage and could consolidate many processes within one device. Learn how WatchGuard provided an easy to manage answer.
Tags : 
watchguard, it solution, administrator, it infrastructure, it security, data management, utm, unified threat management
    
WatchGuard
Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
Las empresas tecnológicas se enorgullecen de adoptar antes que otras los portales más innovadores del mercado digital. Las empresas líderes, como IBM, son conscientes de que cuando los diversos departamentos de una empresa utilizan las redes sociales para escuchar a su audiencia y a sus colegas, consiguen más información sobre sus clientes, competidores, industria y comunidades. Descarga este informe técnico para descubrir cómo las redes sociales están creando una nueva era en cuanto a conocimiento del cliente y la industria por parte de las empresas tecnológicas. Además, los cargos directivos de la industria están superando los retos que supone integrar las redes sociales en su organización.
Tags : 
hootsuite, social relationship platforms, it leadership, social media, social media advice, success stories, emerging marketing
    
uberVU via HootSuite
Published By: Glasshouse Technologies     Published Date: Oct 31, 2012
Implementing a multi-tiered cloud strategy offers flexibility for protection required for workloads and cost-savings of inexpensive cloud services. Learn how to execute a unified, infrastructure to enable organizations to make the best of cloud.
Tags : 
glasshouse, cloud computing, data center, disaster recovery, infrastructure operations, it consulting
    
Glasshouse Technologies
Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança, segurança
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
De acordo com o SANS Institute, a maioria das organizações está usando dados sobre eventos de segurança para detectar e monitorar comportamentos suspeitos, auxiliar em análises periciais, bem como cumprir os requisitos regulamentares e comprovar essa conformidade. Porém, fica difícil atingir essas metas de segurança com o número cada vez maior e a natureza sofisticada dos ataques. À medida que a disputa entre a segurança e os hackers continua, a McAfee conta com os recursos de que as empresas precisam para manter seus dados seguros e identificar ataques e vulnerabilidades. De acordo com o SANS, a força do McAfee ESM vem da sua facilidade de uso, da velocidade e da flexibilidade na definição de regras e correlações.
Tags : 
siem, armazenamento de dados, análise de eventos, ataques, análise pericial, segurança
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Ofrecida durante un tiempo limitado. Consiga su copia hoy.Tome la decisión correcta sobre qué firewall es necesario para su negocio con La Guía para compradores de firewalls. Esta guía le da: - Los fundamentos de la tecnología moderna del firewall - Los 10 requisitos de negocios críticos que su nuevo firewall debería tener en cuenta - Información sobre cómo crear un (RFP) - Un plan de pruebas funcional para ayudar en su proceso de selección de firewall
Tags : 
firewall, palo alto, tecnologia
    
Palo Alto Networks
Published By: Adobe     Published Date: Oct 11, 2018
in our 24-criteria evaluation of experience optimization platform (EoP) providers, we identified the eight most significant ones — Adobe, dynamic Yield, Evergage, Monetate, optimizely, oracle, sAs, and sitespect — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (Ci) professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 11, 2018
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, evergage, google, IBM, localytics, Mixpanel, optimizely, sAs, and Webtrekk — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 02, 2018
In our 39-criteria evaluation of customer analytics solutions providers, we identified the nine most significant ones — Adobe, AgilOne, IBM, Manthan, NGDATA, Salesforce, SAP, SAS, and Teradata — and researched, analyzed, and scored them. This report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
    
Adobe
Published By: Epicor     Published Date: Sep 21, 2017
El objetivo principal de las empresas de manufactura es lograr el crecimiento de su empresa. A pesar de que los fabricantes prevén el crecimiento la mayoría enfrentan desafíos tales como la administración del crecimiento. Epicor ha preparado el eZine “Aumento de Rentabilidad en acción” en donde da a conocer como empresas como la suya han logrado el crecimiento con éxito.
Tags : 
erp software, enterprise resource planning software, erp selection, manufacturing, increase roi
    
Epicor
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.