Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it organization

Results 251 - 275 of 5359Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Mar 28, 2019
Digital business brings to mind innovative technologies: mobile devices, intelligent sensors, wearable devices, virtual reality, chatbots, blockchain, machine learning, and other technology. For some, it also reflects the rapid rise of new digitally native businesses that have disrupted traditional business models and destabilized established companies and industry sectors. For the majority of organizations, digital business means pivoting to a culture of organizational agility, where the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. As most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility.
Tags : 
    
Red Hat
Published By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
    
Blue Prism
Published By: Workday     Published Date: Mar 26, 2019
The rapidly changing healthcare industry won’t slow down to accommodate inefficient systems. Workday helps healthcare providers take control of change with a single cloud-based system for finance, HR, and supply chain. Watch the quick demo to see how your organization can: • Adapt to growth and reform-driven changes • Make better, faster decisions based on real-time insights • Attract, develop, and engage top talent for patient care.
Tags : 
    
Workday
Published By: Red Hat     Published Date: Mar 26, 2019
The rise of digital platforms and their rapid adoption by customers has created significant opportunities for financial service organizations. Industry leaders are capturing additional revenue streams and creating new value chains by investing in this distribution channel. Regulators are also encouraging participation in open banking through either guidance or mandate, aiming to improve competition in the financial services marketplace. Lastly, the pace of technical innovation is reducing the barrier to market entry, driving interest in open banking by incumbents and challengers alike. However, the full value of open banking might be not always be so clear. Below are five benefits for organizations that embrace open banking.
Tags : 
    
Red Hat
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Cohesity     Published Date: Mar 26, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year. Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers, your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Avaya     Published Date: Mar 22, 2019
Infusing communications into business processes is not a simple task, as legacy deployment models for unified communications and the contact center are far too rigid to offer the required agility for digital organizations. To achieve success in the digital era, businesses must evolve their communications to a cloud delivery model. Dive into this white paper from ZK Research to discover the best path forward on your cloud transformation journey.
Tags : 
    
Avaya
Published By: Avaya     Published Date: Mar 22, 2019
Cloud technology is quickly becoming the default at companies of all sizes. Nine out of ten companies have already moved at least some of their applications or computing infrastructure to the cloud or plan to do so in the next 12 months. IT spending reflects this trend, with the average investment in cloud rising nearly 36% from two years ago. What’s more, cloud adoption isg rowing across all delivery models, with examples of every kind of application and workload on every kind of platform, according to a recent IDG survey. The survey results represent the practices and opinions of 550 IT decision-makers whose organizations have either already adopted cloud technology or plan to do so within the next three years.
Tags : 
    
Avaya
Published By: SAS     Published Date: Mar 20, 2019
What’s on the chief data and analytics officer’s agenda? Defining and driving the data and analytics strategy for the entire organization. Ensuring information reliability. Empowering data-driven decisions across all lines of business. Wringing every last bit of value out of the data. And that’s just Monday. The challenges are many, but so are the opportunities. This e-book is full of resources to help you launch successful data analytics projects, improve data prep and go beyond conventional data governance. Read on to help your organization become truly data-driven with best practices from TDWI, see what an open approach to analytics did for Cox Automotive and Cleveland Clinic, and find out how the latest advances in AI are revolutionizing operations at Volvo Trucks and Mack Trucks.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
In today’s crowded analytics marketplace, who can you trust? What’s needed to deliver on the promise of transforming data into real value? And what do CIOs need to cost-effectively and successfully lead their organizations through changing technologies? For an organization to experiment with (and ultimately deploy) analytics, the responsibility falls squarely on the shoulders of IT. IT must provide secure access to lots of high-quality data, a friendly environment for experimentation and discovery, and a method for rapidly deploying and governing models. SAS can support an organization's journey toward becoming a data- and analytics-driven organization. We can help unlock the value by enabling with choices that make sense. Plus, we can show organizations how to get the most out of technology investments.
Tags : 
    
SAS
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies
Published By: Cohesity     Published Date: Mar 19, 2019
As an enterprise admin for over 20 years now, I have seen many technology successes, challenges, and even failures throughout my career. For all enterprise admins, learning is a critical element of job success, but so is sharing what you have learned with others. Today I am embarking on a series of posts where I will be sharing many technology challenges that could have been avoided with a proper backup strategy. From there we will touch on how a modern backup solution can protect your organization from the preventable issues I’ll be writing about.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo
Published By: MindTouch     Published Date: Mar 18, 2019
Improving contact center efficiency remains a top priority for most service professionals. Yet, the impetus for doing so has shifted from a conversation about cost toward a greater focus on the customer experience. The reason is simple: contact center efficiency costs are intertwined with the customer experience. Increasingly, controlling cost in the contact center depends on the extent to which an organization can meet the growing demand for A+ customer self-service experiences. When I have a question, customers now ask, is it quick and easy to find an answer? Three important pillars of contact center efficiency now depend on the answer to this question.
Tags : 
    
MindTouch
Published By: Infosys     Published Date: Mar 15, 2019
Today, most incumbent organizations (those established before the onset of the digital revolution), in every industry are grappling with the risks of disruption with one hand even as they reach for its opportunities with the other. After years of looking the other way, and then reluctant admission, incumbent organizations have come to accept and even embrace disruption in their business. Most are responding by committing to the idea of digital transformation. But that is where the similarity ends.
Tags : 
    
Infosys
Published By: Avaya     Published Date: Mar 15, 2019
Organizations around the globe are finding measurable success with their DCX initiatives, which has become a competitive differentiator, redefining loyalty by how well an organization engages, serves, and responds to customers and prospects. A recent global study by Nemertes Research shows that the metrics for DCX are so compelling, as business and IT leaders you must align on strategic goals and objectives you need to meet, and then move swiftly to launch your own DCX initiatives.
Tags : 
    
Avaya
Published By: Avaya     Published Date: Mar 15, 2019
Organizations around the globe are finding measurable success with their DCX initiatives, which has become a competitive differentiator, redefining loyalty by how well an organization engages, serves, and responds to customers and prospects. A recent global study by Nemertes Research shows that the metrics for DCX are so compelling, as business and IT leaders you must align on strategic goals and objectives you need to meet, and then move swiftly to launch your own DCX initiatives.
Tags : 
    
Avaya
Published By: SambaSaftey     Published Date: Mar 15, 2019
Best practices for taking control. The numbers don’t lie: Driver monitoring can reduce accidents, save organizations money, and protect the people and communities you serve. Advances in safety technology, like comprehensive driver monitoring solutions, are enabling companies not only to stay safer, but to better navigate the tricky territory of insurance. By following a few new best practices, you can manage insurance costs and protect your company’s bottom line before your drivers even hit the road. In our free white paper, “Lowering Commercial Automotive Fleet Insurance Costs,” we’ll show you: • The many ways vehicle crashes affect the bottom line • A deeper look at the risks of employer- and employee-owned vehicles • How negligent entrustment suits can snare companies in any industry • How to mitigate risk and take control of insurance
Tags : 
    
SambaSaftey
Published By: SambaSaftey     Published Date: Mar 15, 2019
What you don't know could hurt your bottom line Let’s begin with a question: Do you know who is behind the wheel? The reality is that for many enterprises with employees who drive as part of their job, the answer is, “I think so,” or maybe, “no.” Driver risk management has recently become a top issue for many organizations since it directly affects budgets and the bottom line. The fact that there are more than 100 million people driving for work-related activities on U.S. roads and many of them have invalid, suspended or no driver’s license at all should be cause enough for concern. But combining this with the facts that: • most organizations’ budgets are at best flat • P&C insurance rates are rising 14% every 2 years • 90% of crashes are due to human error • there are fewer qualified drivers available today • the number of lawsuits around negligence are skyrocketing • and it becomes clear that understanding exposure to driver risk is imperative for every organization. So what do
Tags : 
    
SambaSaftey
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.