Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

soc

Results 1 - 25 of 2981Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware
Published By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
Published By: HP Inc.     Published Date: Apr 05, 2019
Al ser diseñadas en asociación con clientes globales, las Workstations HP Z están creadas para ofrecer un alto desempeño, gran confiabilidad y facilidad de soporte para cumplir con los exigentes estándares de la industria.
Tags : 
    
HP Inc.
Published By: Trustpilot     Published Date: Oct 26, 2018
If you’ve ever ordered your morning coffee and felt uninspired by the request to participate in an online survey or leave a social review regarding your experience, you probably didn’t have a particularly noteworthy experience. If you’re willing to take time out of your day to leave online feedback, it’s usually because you want to warn people about a bad encounter, or to help them make a better buying decision. Think the online review phenomena might sometimes have ulterior motives? Read on to see what we uncovered.
Tags : 
    
Trustpilot
Published By: Gigamon     Published Date: Mar 26, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon EMEA
Published By: Datastax     Published Date: Apr 08, 2019
For decades, organizations relied on traditional relational database management systems (RDBMS) to organize, store, and analyze their data. But then Facebook came along, and an RDBMS was suddenly not quite enough. The social giant needed a powerful database solution for its Inbox Search feature, and Apache Cassandra—a distributed NoSQL database—was born. Released as an open source project in July 2008, Cassandra—named after the mythological prophet who famously put a curse on an oracle—became an Apache Incubator project in March 2009. It graduated to a top-level project in February 2010
Tags : 
    
Datastax
Published By: Datastax     Published Date: Apr 08, 2019
We live in the age of “multi”. Everything is becoming more complex, more “intelligent”, and more distributed. Hybrid cloud isn’t really the new frontier—some companies have been operating in a hybrid cloud environment for nearly a decade—the new frontier is learning HOW to take full advantage of hybrid cloud without creating data silos or busting the IT budget. Enterprises are, of course, always looking for ways to make their computer systems faster, more highly available, more fault tolerant, and simpler to scale. But in the age of “multi,” this is becoming harder and harder to do. Imagine running a social network with millions of U.S.-based users and millions of European users. You could host all your servers and data in the United States, but then all of your European users would have a slower experience using your application than their U.S.-based counterparts. You could host all your servers and data in Europe, but then the U.S.-based users would have a slower experience. An obvio
Tags : 
    
Datastax
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 16, 2019
For electronics companies, Blockchain technology can reduce frictions to improve the cost, time and risk associated with complex processes.
Tags : 
    
Group M_IBM Q2'19
Published By: Bluecore     Published Date: Sep 18, 2018
Email marketers have always dreaded the unsubscribe, and at the cost of nearly $18 or more per unsubscribe depending on your average order value, it’s clear why. Altogether, the cost of an unsubscribe -- in terms of lost revenue potential and associated soft costs — is nothing to blink at. Fortunately, there are several steps you can take to decrease your unsubscribe rate and recover some of that otherwise lost revenue.
Tags : 
email, marketers, subscriber, revenue
    
Bluecore
Published By: Gameffective     Published Date: Feb 26, 2019
We all know that employee engagement is important. Employees that are aligned with their goals, aware of their performance gaps, and motivated to improve, perform better. It’s stating the obvious. The big question is how to get there, and whether technology can help us do this at scale. This is where most digital motivation initiatives hit a wall. A new breed of next generation performance and feedback systems are attempting to do just that: creating and maintaining a continuous personalized conversation between employees and managers with regards to performance, development and goals. In online marketing, personalizing messages and promotional activities has been possible for some time. It is called “Marketing Automation”. Hubspot, one of the pioneers in this field, defines it thus: “software that exists with the goal of automating marketing actions. Many marketing departments have to automate repetitive tasks such as emails, social media, and other website actions. The technology of
Tags : 
    
Gameffective
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation, network management, network performance management, network security, wide area networks
    
Virtela Communications, Inc.
Published By: Zoovu Limited     Published Date: Apr 12, 2019
Customer Engagement is a huge area of interest today, and a subject that countless marketers are talking about. One thing above all is clear: the Engagement Economy provides incredible opportunity for brands. Those organizations that are willing to provide value and put the customer first will rise above the rest. To conclude, we highlight some of the key areas you should focus on: Create an effortless experience —understand customers, and use this knowledge to deliver the right level of personalized service every time. Make it easy to engage —offer a range of ways for customers to contact your organization to provide flexibility and meet the demands of a diverse customer base. Go the extra mile —creating memorable experiences can pay off and be rewarded by brand champions telling friends and family, engaging on social media and writing positive reviews.
Tags : 
customer engagement, digital engagement, guided selling, e-commerce, engagement economy, digital commerce, digital marketing, conversion, sales, growth, brands, customer experience, customer journey, conversion, engagement, machine learning, personalization, recommendation, conversational marketing, retail.
    
Zoovu Limited
Published By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : 
curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc, service oriented communications
    
NEC
Published By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
    
Darktrace
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring
    
CareerBuilder
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo, side bar
    
ASG Software Solutions
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
    
StrongMail
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
    
StrongMail
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.