metric

Results 1 - 25 of 728Sort Results By: Published Date | Title | Company Name
Published By: Achievers     Published Date: Nov 06, 2019
But while most executives see a clear need to improve employee engagement, many have yet to develop tangible ways to measure and tackle this goal. However, a growing group of best-in-class companies says they are gaining competitive advantage through establishing metrics and practices to effectively quantify and improve the impact of their engagement initiatives on overall business performance. These are among the findings of the Harvard Business Review Analytic Services report of more than 550 executives around employee engagement—research that features in-depth interviews with 12 best-practice company leaders.
Tags : 
    
Achievers
Published By: ttec     Published Date: Nov 04, 2019
As customer service organizations grow more complex, the day-to-day work of a contact center agent will change. Automation will tackle simple, repetitive tasks; agents will need different skills to handle more complex requests. This report helps contact center leaders understand how they need to hire a different type of workforce as AI, automation, and the changing nature of contact center work impact agent responsibilities, metrics, and performance — and what that means for customer experiences in the future.
Tags : 
    
ttec
Published By: Resolver     Published Date: Nov 01, 2019
Based on what Resolver has learned by working with hundreds of security leaders, they’ve found there isn’t a one size fits all model for creating workflows that effectively responds to every security incident. Even within an organization, not every incident will be able to go through the same process. That’s why they’ve developed an incident workflow template for your corporate security team. This a great framework to get you thinking about the various stages that could be involved in a single incident. Download this resource to uncover: - Best practices on how to keep incident submission simple to ensure adoption across the organization - Important factors to consider for the portal and triage step of incident submission - How to include notification and task assignment to your incident workflow - A sample list of key metrics used by industry-leading security professionals - Plus! Get a free printable incident workflow template that you can use with your team
Tags : 
    
Resolver
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: ttec     Published Date: Oct 29, 2019
As customer service organizations grow more complex, the day-to-day work of a contact center agent will change. Automation will tackle simple, repetitive tasks; agents will need different skills to handle more complex requests. This report helps contact center leaders understand how they need to hire a different type of workforce as AI, automation, and the changing nature of contact center work impact agent responsibilities, metrics, and performance — and what that means for customer experiences in the future
Tags : 
    
ttec
Published By: Quantum Metric     Published Date: Oct 18, 2019
TravelPass Group is a marketplace for independent and brand name hotels, wholesalers, and the world’s largest travel agencies. To better track their customer experience, they began to look at screen recording technologies and Quantum Metric was brought to Knudson’s attention. They have saved millions of dollars, finding solutions faster through the platform.
Tags : 
    
Quantum Metric
Published By: Quantum Metric     Published Date: Oct 18, 2019
Attaining your customers’ undivided attention is a key challenge for any online business. This challenge is amplified, however, when they explore your brand via their mobile device. Using Quantum Metric’s unique dataset, this infographic showcases the importance of keeping your mobile visitors engaged. Mobile visitors purchase 4X less than desktop visitors among Fortune-500 companies.
Tags : 
    
Quantum Metric
Published By: Quantum Metric     Published Date: Oct 18, 2019
At Quantum Metric, helping companies improve digital customer experience is our passion. We’ve harnessed the learnings and observations we’ve had across dozens of Fortune 500 organizations to develop a methodology that companies can use to achieve meaningful results quickly - helping leadership and teams highlight the lowest hanging fruit in their organizations. The principles for our guide are: Be Easy to Understand. Five clear steps with specific goals and outcomes. Provide Value from Day One. No month-long assessments required. Deliver Quantifiable Outcomes. Clear, objective, and measurable improvements. Be Consistent. Produce repeatable results. Be Universal. Applicable to a wide-variety of businesses and situations. Using the concepts illustrated within this methodology, digital teams from every industry have been able to consistently deliver stellar customer experiences that encourage and maintain long term brand loyalty.
Tags : 
    
Quantum Metric
Published By: ttec     Published Date: Oct 16, 2019
As customer service organizations grow more complex, the day-to-day work of a contact center agent will change. Automation will tackle simple, repetitive tasks; agents will need different skills to handle more complex requests. This report helps contact center leaders understand how they need to hire a different type of workforce as AI, automation, and the changing nature of contact center work impact agent responsibilities, metrics, and performance — and what that means for customer experiences in the future.
Tags : 
    
ttec
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Apptio     Published Date: Oct 09, 2019
Cloud migration is consistently one of the top priorities of technology leaders across the world today, but many are overwhelmed by trying to plan their cloud migration, struggling to prioritize workloads and unsure of the cost implications. Download this white paper to discover the 5 key steps for cloud migration based on the best practices of today’s most successful IT leaders: - Baseline TCO resources (cloud, on-premises, hybrid) - Map current on-premises resources to cloud offerings - Evaluate and prioritize migration strategy - Calculate migration costs - Define success metrics
Tags : 
    
Apptio
Published By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
    
Apptio
Published By: Workable     Published Date: Oct 09, 2019
In every organization, the recruiting process generates data: how long it took to fill one role, how many candidates progressed to the final hiring stage or how many comments hiring teams exchanged until they made a hire. Through tracking metrics, you can get tangible evidence of how successful your recruiting process is, rather than relying on intuition. In this guide, we put together everything you need to know to start making the most out of your recruiting data. You’ll find: A list of common recruiting metrics to track. A detailed look into five of the most important KPIs. How to collect data and track metrics consistently over time.
Tags : 
    
Workable
Published By: MasterControl     Published Date: Oct 08, 2019
Metrics reign supreme in manufacturing, which means any new technology must be evaluated on its ability to drive measurable, scalable impact to your production operations, product quality and site performance. MasterControl has been helping companies ensure product quality and compliance for over 20 years — but often those metrics are about mitigating long-term risk versus driving real-time operational gains. That is until now. The new MasterControl Manufacturing Excellence solution delivers the next generation of digital production records to drive immediate improvement to plant operations and product quality.
Tags : 
    
MasterControl
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: Lenovo - APAC     Published Date: Oct 03, 2019
Biometric fingerprint scanners that exceed EPCS security requirements, antimicrobial surfaces, and Quick Clean technology that enables wipe-downs without the shutdown, the ThinkPad T490 Healthcare Edition also boasts impressive audio and video performance, making it the ideal choice to meet the needs of healthcare today. Learn more – download the solution brief
Tags : 
    
Lenovo - APAC
Published By: Quovant     Published Date: Oct 01, 2019
Even with the greatest level of talent on your in-house legal team, you will at some point, need the services of external counsel. When an organization rates its outside law firms, selecting just the right data might be a challenge. Business leaders may not be lawyers, so it may be necessary to rely on the self-assessment of firms to determine the “health” of their programs. But does it need to be that subjective? Hard data is an essential tool when it comes to performance evaluation. There are specific metrics organizations can use to evaluate law firm performance. While it may not be “all about the money,” these key metrics can provide insight into how your panel handles its work and the value of the results you receive.
Tags : 
    
Quovant
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.