sophisticated

Results 151 - 175 of 406Sort Results By: Published Date | Title | Company Name
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
We’re living in the age of the customer, so it’s understandable that many companies are striving — and claiming — to be customer obsessed. yet many still fall short of creating superior customer experiences, even with sophisticated customer analytics in place, because of myopia and internal misalignment. The solution lies in a new customer insights paradigm: the next best experience (nBX). customer insights (ci) pros need to reevaluate their current analytics practices and embrace the nBX model to become truly customer obsessed.
Tags : 
    
Selligent Marketing Cloud
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
    
MessageLabs
Published By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : 
titan, tiered storage, storage, bluearc, storage system
    
BlueArc Corporation
Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence
    
Splunk
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Today’s B2B buyers are socially sophisticated and informed. Your sales team must be too. Do you have the tactics, tools and training to leverage social media for sales success? Build your funnel and crush your quota with real-world tips on using social to listen, learn and engage.
Tags : 
social media, social media management, enterprise, hootsuite, social selling, sales, marketing
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 15, 2014
Today’s B2B buyers are socially sophisticated and informed. Your sales team must be too. Do you have the tactics, tools and training to leverage social media for sales success? Build your funnel and crush your quota with real-world tips on using social to listen, learn and engage.
Tags : 
social media, social media management, enterprise, hootsuite, social selling, sales, marketing
    
uberVU via HootSuite
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Teradata     Published Date: Feb 04, 2015
Digital marketing campaigns provide quantifiable results like nothing ever before, and the multi-channel world is certainly the biggest opportunity to hit marketing strategies in decades. But how can sophisticated brand marketers keep pace with everything new in digital marketing? Where will it take us next? And how can marketing leaders use digital channels to edge out competitors? Read this white paper to learn the benefits of personalization to digital marketing, how to make your digital marketing practices future focused, and how responsive email design can increase open rates and reduce subscriber opt-outs.
Tags : 
teradata, digital, marketing, brand, engagement, personalization, experience, performance
    
Teradata
Published By: Google Analytics 360 Suite     Published Date: Jul 27, 2017
Today’s marketing leaders need sophisticated tools to turn data into cross-channel insights that improve performance. In a new report, Gartner compares 11 digital marketing analytics solutions across five key areas: data integration, exploration, advanced models, platform integrations, and measurement. Selecting the best solution for your team requires thoughtful analysis. How will you determine the best fit? Gartner’s Magic Quadrant can help.
Tags : 
    
Google Analytics 360 Suite
Published By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
    
Jamf
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Outreach.io     Published Date: Apr 09, 2018
Let’s acknowledge the elephant in the room: even the best sales leader is still a single person, not some kind of commission magician. No matter how many spreadsheets you make or how many Tony Robbins podcasts you download, today’s sales workload is too much for any single person to handle. In fact, research shows that 50% of salespeople will miss their number this year. So let’s take a collective breath and acknowledge the truth: there’s just no way any one person can manage today’s sophisticated sales funnel and pipeline without significant assistance. Sales engagement platforms are a cutting edge solution to these formerly insurmountable sales challenges
Tags : 
    
Outreach.io
Published By: TIBCO Software     Published Date: Feb 26, 2019
MoneyLIVE’s annual survey of over 600 banking professionals found that traditional banks face a significant challenge when it comes to building AI-powered customer journeys. 75% believe that as the use of AI intensifies, banks will struggle to recruit the necessary expertise. 84% fear regulatory and liability issues surrounding AI. Just 7% think their organization’s use of AI is highly sophisticated. But for banks to keep pace with challengers and FinTechs, it’s crucial that they harness this continually evolving technology. Download this chapter of MoneyLIVE's The Future of Retail Banking Report 2018/19 now and understand how TIBCO’s Connected Intelligence Platform, with the use of AI and machine learning algorithms, can help with banks’ digital transformation needs.
Tags : 
artificial intelligence, machine learning, financial services, retail banking
    
TIBCO Software
Published By: TIBCO Software     Published Date: Mar 04, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: Shape Security     Published Date: Sep 12, 2019
A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. Not only were the attacks leading to account takeover fraud losses, but the sheer volume of attacks also put significant strain on the bank’s infrastructure. After months of playing cat-and-mouse with the attackers, the bank decided to seek out a sophisticated solution and approached Shape. In this case study, learn how Shape’s Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Tags : 
    
Shape Security
Published By: Adobe     Published Date: Jul 10, 2019
Every organisation is at a different point in their progression with campaign management. Maybe you’ve had some success with email marketing and you want to expand your efforts across additional channels. Perhaps you invested in a campaign management solution several years ago when you had fewer marketing channels, simpler data sets and less sophisticated customers. It could be you’re a new marketing team, eager to set yourself up for success with an enterprise-class campaign management solution that meets all the requirements you know about—and even some you don’t.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 22, 2019
Every organisation is at a different point in their progression with campaign management. Maybe you’ve had some success with email marketing and you want to expand your efforts across additional channels. Perhaps you invested in a campaign management solution several years ago when you had fewer marketing channels, simpler data sets and less sophisticated customers. It could be you’re a new marketing team, eager to set yourself up for success with an enterprise-class campaign management solution that meets all the requirements you know about—and even some you don’t
Tags : 
    
Adobe
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: Microsoft Azure     Published Date: Apr 05, 2018
Securing data and systems is a top priority for organizations. But meeting this challenge gets more difficult every day as attacks grow more sophisticated, employees use a wider array of devices and applications, and data flows into and out of your business in more ways
Tags : 
    
Microsoft Azure
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.