Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

soc

Results 3101 - 3125 of 3141Sort Results By: Published Date | Title | Company Name
Published By: Kronos     Published Date: Sep 20, 2018
Advanced analytics tools can help SMB retailers trim expenses while simultaneously improving shopper/associate engagement. Armed with big data insight into the performance of individual associates and stores small- and mid-size retailers can close the gap on the industry’s biggest players. Download this Retail IQ report and discover how retailers both big and small can benefit from cutting-edge insight into the performance of their workforce to better schedule, plan and assign tasks.
Tags : 
    
Kronos
Published By: Valerie Schlitt Associates     Published Date: Aug 01, 2017
This Executive Summary is the second part of a two-content piece series to help B2B marketing and sales executives understand and optimize the telemarketing landscape as it exists today. We've heard that cold calling is dead, but is it really? Read Part Two and learn how the experts overcome appointment-setting challenges; read your peers' take on what's working in B2B engagement strategies, and get our handy checklist that can help you evaluate B2B lead generation experts for appointment setting, yours included.
Tags : 
    
Valerie Schlitt Associates
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Durante los últimos años, la gestión de accesos con privilegios (un conjunto de funciones de control, monitorización y auditoría cuyo fin es mitigar los riesgos asociados a los usuarios, las cuentas y las credenciales con privilegios) se ha convertido en una de las principales prioridades para cualquier tipo de organización.
Tags : 
prevención de fugas de datos, gestión de las amenazas internas, auditoría y conformidad con normativas, infraestructura de ti híbrida
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
OAuth permet à l’utilisateur de déléguer ses droits d’accès à une API, permettant ainsi à un service d’être intégré à un autre pour le compte de cet utilisateur. Ce sont les mêmes fournisseurs du Web social qui ont popularisé le schéma d’exposition d’une API afin de permettre à des développeurs tiers d’enrichir leurs plates-formes qui ont été les premiers à avoir appliqué ces mécanismes de délégation des autorisations. Créé en 2006, le protocole OAuth a permis de standardiser les mécanismes de ce type.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Les entreprises sont tous les jours concurrencées par de jeunes start-up numériques qui réussissent à répondre aux nouvelles demandes du marché avant les sociétés bien établies
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: Fiserv     Published Date: Jul 09, 2018
Even with the rise of digital payments, cash is still a popular form of payment. According to the Federal Reserve, consumers use cash to pay for nearly one-third of all retail transactions. For many retailers, a completely "cashless society" is nowhere in sight. Cash management remains one of the most important aspects of managing a retail operation, particularly at quick service restaurants (QSRs) and convenience stores, where transactions are smaller and cash is a preferred method of payment. This white paper, Boost Profitability by Automating Cash, sponsored by Fiserv and Fast Casual, details the steps to manage cash properly and boost profit for your business. Uncover the top reasons and flexible options to automate your cash management. • Time savings • Theft deterrence • Higher accuracy • Better customer service • Real-time data
Tags : 
cash automation, smart safe, cash loss, cash handling, automated cash handling, cash management, cash reconciliation, manual cash reconciliation
    
Fiserv
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
    
Oracle Security Solutions
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for manufacturing operations that assists customers with the entire process: from financial management to supply chain management and production management. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectivelyexamine the potential return on investment (ROI) enterprises may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their manufacturing organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with four Enterprise Management manufacturing customers, each with at least three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for services operations; these solutions assist Sage customers with core financial and supply chain management functionality. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) that services organizations may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their services organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with six Enterprise Management for Services organizations customers, each with at least two to three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for services operations; these solutions assist Sage customers with core financial and supply chain management functionality. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) that services organizations may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their services organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with six Enterprise Management for Services organizations customers, each with at least two to three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every minute, the equivalent of one garbage truck of plastic waste enters our oceans—a total of 8 million metric tons a year. This plastic waste litters the seafloor and floats on the surface in vast plastic patches, poisoning seabirds and other marine life. By the year 2050, one estimate suggests there will be more plastic than fish in the world’s oceans. Founded in May 2013, social enterprise The Plastic Bank aims to tackle ocean pollution head-on.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Encryption, if properly deployed and managed, is one of the most powerful tools that organizations can use to avoid costly and embarrassing data breaches. Yet organizations struggle with the complexity associated with the technology that often stems from a history of siloed investments of point solutions designed to largely address pools of regulated data associated with a compliance mandate.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
What are the benefits and costs of implementing an API Management solution? Forrester Consulting analyzed the Total Economic Impact (TEI) of IBM API Connect, developing a composite organization based on surveys of 32 IBM customers. Some of the key questions answered by this paper are: • What are the costs associated with IBM API Connect, and what returns can I expect for my business? • What are the benefits, both financial and business, that I can expect from API Connect? • What's the financial impact of API Connect on developing new opportunities for businesses, developers, and customers? Read on to learn about the financial benefits of choosing API Connect as your API management solution.
Tags : 
    
Group M_IBM Q418
Published By: TE Connectivity     Published Date: Jan 09, 2018
The concept of an automated home is not a new one: the idea has been floated since the 1930s at World’s Fair venues, and in popular culture as TV shows and movies imagine home life of the future – solidifying the public’s view of the benefits of home automation. In the 1980s, modern versions of the automated home began to turn up in the marketplace. The concept of the “connected house” was first introduced by the American Association of Homebuilders, and formed the basis of what we now consider to be “home automation.” The connected house presented a new way to wire, connect, and control all of the devices in the modern home. However, it proved to be too expensive, cumbersome, and difficult to construct, and became limited to the luxury homebuilder market.
Tags : 
    
TE Connectivity
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide features all of our dependable connectivity solutions for data & power. You’ll get 1. Data Communications Product Guide 2. Standard Flexible Printed Circuit (FPC) Connectors Quick Reference Guide 3. Memory Sockets Quick Reference Guide 4. Stacking Height Guide for Parallel Board-to-Board Applications 5. RF Connectors Quick Reference Guide 6. High Speed Input/Output Solutions Quick Reference Guide 7. AMPLIMITE Subminiature D Connectors Catalog 8. Soft Shell Pin & Socket Connectors Catalog
Tags : 
    
TE Connectivity
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Workday France     Published Date: Mar 08, 2018
Nous connaissons actuellement une révolution technologique sans précédent. Entre les appareils mobiles avec écrans tactiles interactifs, la 3D au cinéma et à la télévision, et la possibilité d’accéder à Internet presque n’importe où dans le monde, la technologie semble apporter de nouvelles solutions à presque tout. in•no•ver (verbe) : introduire une nouveauté (méthodes, idées ou produits) au sein de quelque chose d’établi. Pourtant, cette innovation semble avoir du mal à imprégner le monde des logiciels de gestion d'entreprise. Alors que le grand public utilise de plus en plus Internet pour trouver des informations et que les appareils sont de plus en plus simples à utiliser, les dirigeants ont toujours du mal à obtenir des informations précises et mises à jour sur la situation financière de leur société, même si toutes les données dont ils ont besoin sont disponibles dans leurs systèmes.
Tags : 
    
Workday France
Published By: Workday France     Published Date: Mar 08, 2018
Les Centres de Services Partagés Ressources Humaines (CSP RH) n’ont rien de nouveau. Selon un récent article du site HR Magazine1, les trois quarts des sociétés figurant au classement Fortune 500 font appel à des services partagés pour une ou plusieurs de leurs fonctions transverses. Un récent rapport de PWC2 indique quant à lui que 89 % des sociétés qui utilisent des services partagés RH ont atteint leurs objectifs initiaux en termes d’économies d’échelle.
Tags : 
    
Workday France
Published By: Workday France     Published Date: Mar 08, 2018
Le Cloud Computing fait le buzz. Et c’est justifié. En réalité, la plupart des entreprises ont déjà intégré certains services Cloud dans leur infrastructure informatique. Les logiciels sur site deviennent obsolètes et les solutions hybrides sont limitées. Les applications Cloud, quant à elles, offrent de nouvelles manières pour déployer des solutions innovantes. Ces solutions sont aussi pratiques que simples à utiliser et à gérer. Aujourd’hui, le Cloud devient le socle de l’infrastructure sur lequel les entreprises innovantes s'appuient pour développer leurs activités.
Tags : 
    
Workday France
Published By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell Server
Published By: Pindrop Security     Published Date: Mar 21, 2018
For a long time, the phone channel was thought to be isolated and less important to defend, when compared to the physical and online channels. The general consensus was that fraudsters could only steal so much over the phone, and it had little impact on fraud across the rest of the organization. But those assumptions are wrong, and they’re becoming grossly inaccurate as technology evolves. The phone channel is now more vulnerable and exploitable than ever before, as annual fraud loss is now a $14 billion problem. Between aggressive fraud rings, social engineering and sophisticated techniques, vulnerable call centers are feeling the sting. Legacy and stand-alone solutions won’t stand up to the perseverance and lengths to which fraudsters are willing to go.
Tags : 
    
Pindrop Security
Published By: Oracle     Published Date: Sep 12, 2019
The following guide looks at 6 characteristics that define today’s most compelling commerce environments, and how the right mix of adaptive, intelligent solutions can optimize performance and ultimately be your most intelligent associate, 24 hours a day, 7 days a week, anywhere in the world. Amp Up the Power of Commerce with AI and Analytics Bring the Customer Journey Full Circle Tap into Heightened Data Security and Privacy in the Cloud
Tags : 
    
Oracle
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Start   Previous    112 113 114 115 116 117 118 119 120 121 122 123 124 125 126    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.