Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

transactions

Results 151 - 175 of 343Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: Nov 28, 2016
Technology has had a profound impact on society, influencing everything from the way we communicate with each other to how we conduct business transactions. In the financial services space, technology has brought banks closer to their customers, offering a wide range of online services to appeal to a population of consumers who now view their smartphones as something they can’t live without. In the process of shifting their practices to accommodate this new generation of customers, banks are transforming and reinventing themselves from the corporate office to the branch office through innovative services and technologies that take banking beyond the traditional experience. Networks are playing a central role in this transformation.
Tags : 
    
Comcast Business
Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
Published By: HiQ Labs     Published Date: Apr 18, 2017
Experts predict the number of M&A transactions will increase in 2017, but the nature of M&A is changing. The old ways of collecting data are getting to be too slow, too expensive, and too subjective. The ideal M&A transaction relies on accurate, actionable scientific insights into the target’s workforce to support the investigation, due diligence and integration aspects of M&A. hiQ Labs applies scientific rigor to publicly available data sets to forecast which employees are at risk of leaving, map the target workforce’s skills onto the buyer’s company, and identify which employees have the skills critical to the deal’s success, so M&A leaders get a faster, cheaper, and accurate solution based on science.
Tags : 
hiq labs, m&a, talent
    
HiQ Labs
Published By: Moxie     Published Date: Feb 08, 2018
Achieve your goals by successfully mapping common sources of customer struggle to the right engagement opportunities. With ever changing customer expectations and behaviors in the new Guided Economy, Crate and Barrel decided to build a competitive advantage to improve customer experience, engagement, and acquisition across mobile and desktop shoppers. By mapping struggle to engagements, digital channels are used to help shoppers select the right products, complete orders, or process payment transactions in a PCI-compliant environment.
Tags : 
customer, opportunities, engagement, planner, digital, templates
    
Moxie
Published By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
    
Veeam '18
Published By: Motorola Solutions     Published Date: Jun 05, 2019
THE TIME IS NOW TO CREATE AN ENGAGING SHOPPING EXPERIENCE FOR EVERY CUSTOMER. In the world of retail, the customer is always right. That’s why retailers today must ensure their staff is well-informed, well-coordinated, armed and ready with the right information to satisfy customers in stores. Whether it’s a customer’s question about a product or a request for a different size, shoppers expect retail associates to be empowered with accurate answers and attentive service. Above all, stores need to rely on strong communication technologies so retailers can deliver a seamless experience for shoppers and keep them coming back. When retailers create an engaging experience, customer interactions turn into transactions and occasional buyers turn into loyal brand advocates. Motorola Solutions Two-Way Business Radios are helping retailers across the nation enhance customer and employee interactions, efficiency and safety both in stores and warehouses – but which business radio model is right for
Tags : 
    
Motorola Solutions
Published By: AppZen     Published Date: Jun 17, 2019
On average, enterprises processed over 200,000 spend transactions last quarter. Finance teams that use artificial intelligence in their spend audit reviewed 100 percent of transactions, versus 2-10 percent of expense reports and 5-10 percent of invoices for teams that didn’t.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Aug 07, 2019
On average, enterprises processed over 200,000 spend transactions last quarter. Finance teams that use artificial intelligence in their spend audit reviewed 100 percent of transactions, versus 2-10 percent of expense reports and 5-10 percent of invoices for teams that didn’t.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Aug 07, 2019
On average, enterprises processed over 200,000 spend transactions last quarter. Finance teams that use artificial intelligence in their spend audit reviewed 100 percent of transactions, versus 2-10 percent of expense reports and 5-10 percent of invoices for teams that didn’t.
Tags : 
    
AppZen
Published By: Intel     Published Date: Mar 19, 2019
Technology has drastically transformed the banking industry and the way in which consumers transact. Mobile banking is now the new normal. Many consumers, especially millennials prefer to do most if not all of their financial transactions via smartphone due to the convenience in which it offers. Even so, the popularity of mobile banking does not imply that the end of retail banking is near as research has shown that consumers still prefer retail banking for complex services such as loan applications, new account openings and advisory services. Download the whitepaper to learn— • How to build a bank of the future by leveraging the Internet of Things • How to increase security, ease system management and reduce operational costs • The benefits of migrating to a thin-client infrastructure and going paperless
Tags : 
    
Intel
Published By: TIBCO Software     Published Date: Nov 07, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: Riverbed     Published Date: Feb 26, 2015
While powerful and beneficial, the Citrix XenApp environment can present new challenges to IT departments when troubleshooting application performance issues. Citrix acts as a proxy for backend applications, making it difficult to get end-toend visibility of transactions and to identify and troubleshoot end-user experience problems
Tags : 
troubleshooting, application performance issues, application management, enterprise application, application virtualization technology
    
Riverbed
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: Epicor     Published Date: Aug 03, 2012
The capabilities that enterprise resource planning (ERP) systems enable in wholesale and distribution have a wide umbrella of influence throughout an organization. Using ERP data to make better business decisions while cutting your costs is only one
Tags : 
wholesalers, distributors, erp capabilities, cross functional teams, full visibility, operations, transactions, technology aids, erp modules, erp extentions, measurement, optimization, measurable benefits, social media
    
Epicor
Published By: HP     Published Date: Jul 29, 2008
This case study highlights how a leading transportation firm uses executive financial incentives to insure the highest system uptime for its customers. With the need to keep thousands of vehicles and employees on the move and process millions of daily transactions, keeping mission critical systems running is essential for financial performance.
Tags : 
mission critical, high availability, transportation, service management, itil
    
HP
Published By: Entrust Datacard     Published Date: May 13, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services provide digital certificate and identity management solutions that bring together all certificate services, tools and security under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud.
Tags : 
entrust, digital certificates, cloud services, identity management, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.
Tags : 
identity guard, cloud services, trust foundation, communication, transactions, information security, cloud-based service, solution, security, wireless
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security
    
Entrust Datacard
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets, security, infrastructure
    
ArcSight
Published By: BMC Control M     Published Date: Jul 22, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Control M
Published By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : 
aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
    
Aberdeen Group
Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.