Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

infor

Results 51 - 75 of 3791Sort Results By: Published Date | Title | Company Name
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: UMEED SOFTWARE SOLUTIONS PVT LTD     Published Date: Feb 18, 2013
OUR ORGANIZATION IS A PRIVATE LIMITED COMPANY AND EXTREMELY SOUND IN SOLAR PV APPOINTMENT SETTING/SURVEY,EVERY INFORMATION GETS CAPTURED VERY CAREFULLY SO THAT THOSE ARE QUALIFY-PRO AND REAL TIME CONVERTIBLE.
Tags : 
    
UMEED SOFTWARE SOLUTIONS PVT LTD
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: SAS     Published Date: Aug 17, 2018
What if we stopped arguing over which analytics software is best, and decided instead to use them all? With today’s analytics technologies, the conversation about open analytics and commercial analytics is no longer an either/or discussion. You can now combine the benefits of SAS and open source analytics within your organization. Download this e-book to learn how businesses in multiple industries are integrating disparate code and information to deploy models and deliver critical results with analytics.
Tags : 
    
SAS
Published By: Zynapse     Published Date: Jun 16, 2010
Data Governance has emerged as the point of convergence for people, technology and process in order to manage the crucial data (information) of an enterprise. This is a vital link in the overall ongoing data management process for it maintains the quality of data and makes it available to a wide range of decision making hierarchy across an organization
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research discusses the need to combine business and technology in a unified approach for MDM implementations in diverse areas.
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research describing the role and importance of partnerships between business and IT in MDM strategy
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: Zynapse     Published Date: Sep 10, 2010
A 14-page whitepaper on how to achieve lower material costs and optimized inventory using Material Master Data Management
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Zynapse     Published Date: Sep 10, 2010
A 26-page information rich whitepaper on the business benefits, challenges and best practices of Material Master Data Management
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Zynapse     Published Date: Sep 10, 2010
A step-by-step guide to create the right business case for all your Master Data Requirements.
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, mmdm, material, tpm
    
Zynapse
Published By: Zynapse     Published Date: Aug 17, 2010
An exclusive success story of a Fortune 200 enterprise. Learn how the master data management initiative delivered: . A unified view of the master data across the enterprise . Accelerated ROI realization from massive ERP investments . Inventory optimization by duplicate identification . Improved operational and process efficiencies
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Zynapse     Published Date: Nov 01, 2010
The 4-undying reasons to take care of during an ERP Data Migration.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Zynapse     Published Date: Feb 02, 2011
A worldwide leader in Spend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leaders in Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, procurement, information management, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Information Builders     Published Date: Sep 24, 2008
Business Intelligence helps retailers, warehouse staff, customer services agents, and your value chain realize new innovations, improve margins, and propel profits to new heights. Learn how Ace Hardware, Food Lion, and others leverage our software.
Tags : 
information builders, infobuilders, business intelligence, soa, roi, crm, marketing value
    
Information Builders
Published By: Magic Logix     Published Date: Oct 20, 2012
According to Buzz Marketing, 85% of business buyers believe companies shouldn't just present information - they should engage with prospective buyers.
Tags : 
    
Magic Logix
Published By: CrowdTwist     Published Date: Jul 25, 2018
Over the last decade customer-brand relationships have become more and more digitized. Companies have enjoyed access to new technologies, new capabilities, and greater access to customer data. In turn, consumers have become better informed and able to connect with brands with greater flexibility and convenience. However, concerns around mismanagement of customer data, the proliferation of fake news, high profile retailer database breaches, and the Cambridge Analytica scandal has contributed to an erosion of trust between consumers and brands and demands for data privacy. What can brands do to overcome consumer skepticism? What keeps a customer coming back in 2018? And what can brands do to demonstrate relevancy and provide value?
Tags : 
customer, branding, relationships, consumer, database
    
CrowdTwist
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data, conversion, marketing roi, direct mail campaign, multi channel marketing, integrated marketing campaign, lead generation, campaign management, tracking and measurement, reports and analytics, marketing dashboard
    
Mindfire
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.