Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

point service

Results 176 - 200 of 215Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Ingenico     Published Date: May 02, 2018
The time of mobile point of sale (mPOS) has arrived. While the mission to adopt EMV has dominated the payments industry over the past few years, many hotels, resorts and casinos are now focusing their efforts on rapid planning and implementation of mPOS strategies. A number of emerging trends are driving this new focus, including an emphasis on enhancing guest experiences and building brand loyalty by leveraging digital and mobile technologies. Innovative hotels, resorts and casinos are using these solutions to create entirely new guest experiences that improve service speed and convenience while creating distinct competitive advantages. mPOS is increasingly becoming a key part of the picture, providing unique opportunities to improve guest service quality and engagement, create new efficiencies and cost savings, and strengthen their brand. This eBook will provide an overview of those opportunities, some key trends in the hotel & lodging industry, and guide you through the key requirem
Tags : 
    
Ingenico
Published By: Metalogix     Published Date: Oct 16, 2013
Microsoft SharePoint sites can play a critical role in just about every business workflow.Originally embraced to streamline internal employee collaboration, today SharePointsystems support customer-facing services and enable information sharing with partners.
Tags : 
metalogix, ebook, microsoft sharepoint, microsoft sharepoint collaboration, governance and compliance, configurations, software development, it management
    
Metalogix
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
As small businesses grow, many reach a point when their computing systems falter. A company with only a handful of employees can usually get by with disconnected computers and software packages. But as you add desktops, laptops and other devices to support an increasing headcount, the system can become so cumbersome that productivity and customer service start to suffer.
Tags : 
benefits, server, small business, it management
    
Dell & Microsoft
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Datacenter improvements have thus far focused on cost reduction and point solutions. Server consolidation, cloud computing, virtualization, and the implementation of flash storage capabilities have all helped reduce server sprawl, along with associated staffing and facilities costs. Converged systems — which combine compute, storage, and networking into a single system — are particularly effective in enabling organizations to reduce operational and staff expenses. These software-defined systems require only limited human intervention. Code imbedded in the software configures hardware and automates many previously manual processes, thereby dramatically reducing instances of human error. Concurrently, these technologies have enabled businesses to make incremental improvements to customer engagement and service delivery processes and strategies.
Tags : 
    
Dell EMC & Intel
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
After several years of relentless hardware and software innovation, the mainframe is at an inflection point. It’s quickly moving from being a supporting platform of transaction revenue to becoming a source of revenue growth and innovation. Organizations are evolving toward what IDC calls the “connected mainframe.” This evolution to the platform is also enabling the mainframe to play a central role in organizations’ digital transformation (DX) journey. Key steps in achieving the connected mainframe require that organizations modernize and integrate the platform with their internal and external environments. IDC finds that these modernization and integration initiatives lead to new business innovations, which in turn are driving revenue growth. Early adopters of a connected mainframe strategy have achieved more than 300% return on investment (ROI). Over 50% of the benefit value came from business productivity gains, realized from higher transaction volumes, new services, and/or business
Tags : 
    
Group M_IBM Q418
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: DocuSign UK     Published Date: Aug 08, 2018
Procurement’s Pesky Paper Problem We know time is precious, so we’ll get right to the point: Paper-based processes are tarnishing your procurement department’s reputation for driving cost savings, improving service, and expediting execution. First, there’s the printing, scanning, faxing, and mailing of documents. Then comes the constant tracking down of physical signatures for everything from statements of work to supplier contracts. Add in the manual filing, searching, and retrieving of hard copies, and it’s no wonder that inefficiency abounds.
Tags : 
    
DocuSign UK
Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: MuleSoft     Published Date: Jan 16, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservice implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: IBM APAC     Published Date: Jun 21, 2019
Understanding cloud environments and making decisions about multiloucd management can be complex. Questions arise, such as how organizations need to change in this multicloud world. Working with enterprise customers, IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations. This covers the following key pain points: • Cost transparency and visibility • Dynamic, up-to-date Catalog • IT to operate in two, connected models • Standardized consumption • Aggregated services for added value • Integration remains a necessity • Control without obstruction • Challenges of user management • Primary consumption: Machine-to-machine purchase • Internal and external IT role changes
Tags : 
    
IBM APAC
Published By: MuleSoft     Published Date: Nov 27, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservices implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Aimia     Published Date: Mar 25, 2014
Identify the most important inflection points along your customer journey from curious newcomers to brand loyalists. In this Retail Brief, learn the 10 most important loyalty moments of truth — and offer a few guidelines for getting them right.
Tags : 
aimia, inflection points, marketing, customer loyalty, customer interaction, loyalty program. post-purchase service, interaction data, purchase cycle, business insights
    
Aimia
Published By: PGi     Published Date: May 03, 2019
As businesses give employees more power to work wherever and whenever they want, IT and business leaders are tasked with creating connected, collaborative work environments that are optimized for all devices. Rather than investing in point solutions that employees may or may not use, many organizations are investing in Unified Communications (UC) — more specifically, UC as a Service (UCaaS) or UC services delivered through the cloud.
Tags : 
    
PGi
Published By: HP     Published Date: Jul 08, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Tags : 
data, data deduplication, data dedupe, disaster recovery, data protection, storage, bandwidth, virtual library system, vls, d2d, disk to disk, san, vtl, virtual tape libraries, pacs, retention, data rate, recovery point objectives, rpos, service level agreements
    
HP
Published By: EMA     Published Date: Sep 23, 2013
Join Steve Brasen, EMA Managing Research Director, and Kimber Spradlin, IBM Product Marketing for Endpoint Manager, for this informative, on-demand Webinar where the latest unified endpoint management research is revealed. Learn the strategic management processes necessary to empower a mobile workforce with the agility to adapt to rapidly evolving business requirements. Topics discussed include: • Securing devices without impeding user productivity • Expanding management processes to address increased device heterogeneity • Supporting employee-owned devices • Simplifying practices for delivering business IT services • Enhancing user flexibility in accessing IT resources necessary to achieve business goals
Tags : 
ibm, ema, on-demand webinar, endpoint management, mobile workforce, strategic management, technology, productivity, wireless, data center
    
EMA
Published By: CradlePoint     Published Date: Sep 04, 2014
Whether your businesses are connected to the Internet via T1/T3, DSL or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is a loss in connectivity via your wired line. With CradlePoint routers as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment. Please download the whitepaper to learn more!
Tags : 
cradlepoint, business continuity, dsl, internet service, t1 or t3 line, distributed enterprises
    
CradlePoint
Published By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.
Tags : 
proofpoint, saas, email security, software-as-a-service
    
Proofpoint
Published By: Amazon Web Services, Inc     Published Date: Nov 21, 2013
Watch this on-demand webinar to learn the steps and available tools necessary to design, setup, and deploy infrastructure to run a multi-server Microsoft SharePoint Server Farm on AWS. Solution Architect Ulf Schoo will cover how to architect for high availability and provision the relevant AWS services and resources to run SharePoint Server workloads at scale on the AWS Cloud. Also included with the video is the Microsoft SharePoint Server on AWS: Reference Architecture Whitepaper.
Tags : 
aws sharepoint, sharepoint hosting, sharepoint server, sharepoint server farm, enterprise sharepoint, sharepoint webinar, sharepoint cloud, sharepoint migration, sharepoint solutions, amazon sharepoint, aws whitepaper, sharepoint applications, sharepoint workloads, online sharepoint hosting, it management, infrastructure, cloud computing
    
Amazon Web Services, Inc
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management, local area networking
    
WebEx
Published By: Avaya     Published Date: Nov 21, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.