Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

centric

Results 351 - 375 of 517Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Apr 14, 2011
Find out how discrete manufacturers are becoming truly customer-centric by pursuing or planning a variety of initiatives, including the improvement of customer service and the closer integration of customers into product design.The greatest impact is expected from plans to implement demand-driven manufacturing.
Tags : 
customer demand, sap, customer intimacy, economist intelligence unit, manufacturer, growth strategy
    
SAP
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: Cisco     Published Date: Dec 21, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: GE Healthcare     Published Date: Feb 23, 2015
This study surveyed radiologists about inefficiencies in their workflows, revealing a number of shortcomings with the information technologies radiologists employ to review, interpret, and report diagnostic imaging examinations.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
    
GE Healthcare
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Case management continues to gain traction as a key capability in the information management space – supporting work that is unpredictable, information-centric and driven by human decisions. These are the processes that often directly touch your customers and stakeholders, including areas like contract management, claims processing, customer service, incident tracking and more. Download this eBook to explore three steps you can take to embrace a case management approach – improving employee productivity and customer experiences.
Tags : 
case, management, ebook, e-book, information, content, dynamic, applications, claims, processing, incident, tracking, solutions, software, strategy, knowledge, worker, enterprise
    
OnBase by Hyland
Published By: Dassault Systèmes     Published Date: May 09, 2018
More connected, informed and demanding customers have the financial services sector looking closely at their processes and products. Collaborative digital platforms can transform your value network and approach. • Improve data insights: Transform legacy systems, manual processes and data silos for consumer-centric collaboration. • Compete with agile FinTech startups: Use disruptive technologies to meet clients’ changing needs. • Empower me to make my own decisions: Give self-directed customers exceptional experiences, like rapid enrolment and self-assessment tools. • Turn regulatory compliance to competitive advantage: Use digitization to improve compliance, reduce risk and enhance governance. • Improve customer experience through digitization: Reduce regulatory issues, gain insights, increase efficiency and customer-centric innovation. I invite you to download your targeted industry analysis and uncover the expectations to take into account at every stage to be disruptive in the age o
Tags : 
    
Dassault Systèmes
Published By: KPMG     Published Date: Jun 06, 2019
20 years on from our first global survey of technology leaders, explore the changing role and growing influence of the CIO. Read this report to find out: • the top-10 business issues facing customer-centric and digital leaders • how successful organisations are turning their strategies into reality • which emerging technologies organisations are investing in • how IT leaders are aiming to plug the skills gap.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 31, 2019
HRs’ unique role in a company in terms of hiring, training, and ongoing engagement with the broader employee base, positions them to be a game changer in the customer experience strategy. Find out HR's critical role in elevating the customer experience. Read this report to discover: • the CHRO’s changing role • ways in which innovative technologies, like D&A and AI, are powering HR • steps CHROs can take to ensure their organisations are hiring the right people and training them to succeed in the customer-centric world.
Tags : 
    
KPMG
Published By: RES Software     Published Date: Apr 08, 2013
In de haast om aan regelgeving of klanteisen te voldoen, hebben organisaties miljoenen uitgegeven aan het implementeren van security en compliance maatregelen, hetzij per situatie hetzij per maatregel. Dit heeft geresulteerd in een asset-centric security benadering, waarbij we focussen op de IT infrastructuur en zorgen dat deze veilig is. In de huidige veelzijdige gebruikers gemeenschap is een gebruiker echter niet langer gebonden aan één enkel apparaat. Dus, hoewel het nog steeds nodig is om de assets te beveiligen, ontstaat er nu behoefte aan een user-centric benadering van security waarbij de security regels in lijn zijn met het gebruik van deze assets. Deze whitepaper geeft een overzicht van zowel de asset-centric als de user-centric aanpak van security. Deze invalshoeken zullen worden gerelateerd aan de standaard voor Informatie Security: ISO 27001.
Tags : 
    
RES Software
Published By: UPS     Published Date: May 24, 2017
For life sciences businesses, the supply chain used to mean one thing: getting products from factory or warehouse to distributors or ultimate customers as quickly and economically as possible. Now, with today’s evolving regulatory environment, an increasingly globalized market, more complex health products, and an increased focus on the patient, pharmaceutical companies and medical device manufacturers are looking at their supply chain and logistics needs in a whole new way.
Tags : 
health care, supply chain, ups, business, science
    
UPS
Published By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
    
Iterable
Published By: Landis + Gyr     Published Date: May 30, 2017
Learn how five asset management strategies have evolved to unlock real-time data. Today, many utilities are developing transformative, data-driven asset management strategies that build on their advanced metering infrastructure (AMI) investments. The results? Improved reliability, customer satisfaction, efficiency, and long-term planning. In this white paper, we examine the relationship between asset management and technology: • How technology advances have driven the evolution of asset management • 5 asset management strategies built on real-time data • How you can prepare for a distribution-centric world
Tags : 
asset management, analytics, data, ami, landis
    
Landis + Gyr
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Aug 06, 2014
Though the global economy is still shaking off the effects of the past and current financial crises, banks in both the emerging and developed economies have an opportunity to manage enormous capital growth and wealth creation. To regain customer confidence and earn their slice of the increasingly competitive market, banks must transform themselves by jettisoning old, product oriented operating models to become a client centric operation. Read this insightful paper from IBM Global Business Services to understand how banks can effectively use the information they have and become truly customer centric by re-organizing their operations around customer differentiation, pricing, product bundling, channel consistency and customer engagement.
Tags : 
ibm, banking, customer, enterprise, financial, capital
    
IBM
Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: Jive Software     Published Date: Mar 11, 2013
Traditional content centric systems and other conventional tools don't provide rich interaction. That requires a very different set of capabilities that only new generation tools can offer. Learn 4 ways that social tools an turn your reps into stars
Tags : 
sales execution, sales effectiveness, social technology, sales tools, sales enablement, social business, enterprise applications
    
Jive Software
Published By: Jive     Published Date: Mar 14, 2013
4 ways to turn reps into top performers
Tags : 
jive, jive software, content-centric, social tools
    
Jive
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : 
financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs, customer experience
    
Comcast Business
Published By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn how planning security for a big data solution is similar to that of other data-centric platforms deployed by many IT departments.
Tags : 
    
Dell EMC
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.