ack

Results 6601 - 6625 of 6723Sort Results By: Published Date | Title | Company Name
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : 
visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : 
visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to tap into their data with artificial intelligence (AI). With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists are tackling new use cases like autonomous driving vehicles and natural language processing.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to analyze and action data using artificial intelligence (AI). Financial services companies can greatly benefit from this leap forward in technology that enables unique insights into all aspects of the industry. With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists now have the ability to tackle complex problems and find credible and profitable solutions.
Tags : 
    
Pure Storage
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
    
Q2 eBanking
Published By: Q2 eBanking     Published Date: Sep 06, 2017
The Q2 Platform and our other solutions bring these benefits to the back offices of banks and credit unions, and allow institutions to take digital banking to its full potential.
Tags : 
    
Q2 eBanking
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Sie haben es jetzt auf wertvolle Daten abgesehen, die online oder über mobile Geräte zugänglich sind.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : 
project, portfolio, management, calculator, execution
    
CA Technologies EMEA
Published By: Quick Base     Published Date: Aug 07, 2017
Many financial leaders struggle to find enough time to do everything needed because they must deal with manual processes and clunky spreadsheets. If you're concerned about wasting time by manually collecting financial data, find out how to conquer spreadsheets with the power of automation. You'll learn key trends and insights backed by research and hear real-world examples and best practices for financial automation. You'll come away with the practical tips and inspiration you need to improve team performance, mitigate financial risk, and increase business impact.
Tags : 
    
Quick Base
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: UBM Technology     Published Date: Sep 05, 2017
IT leaders need a full stack of skills to survive and thrive in today's technologically driven world, and striking a balance between cost control and innovation is crucial.
Tags : 
    
UBM Technology
Published By: Insight Software     Published Date: Mar 14, 2018
xxx
Tags : 
company, data, organization, analytics, metrics, hubble
    
Insight Software
Published By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: IBM Watson Health     Published Date: Jul 06, 2018
The need Carson Tahoe Health needed insights to convince its board that an outpatient palliative care program could help address its higher-thanaverage mortality rates and help decrease the risk of future financial impact from those rates The solution The healthcare system used IBM® CareDiscovery to track and analyze end-stage patient mortality and related length of stay, readmissions, utilization and costs in key disease groups—by comparing those who participated in trial inpatient palliative care and those who did not The benefit The analysis was used to demonstrate to the system’s board that an outpatient palliative care service line was viable in terms of both cost savings and quality-of-care improvement
Tags : 
    
IBM Watson Health
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Wasabi     Published Date: Oct 20, 2017
The Kim Komando Show, the largest weekend radio show in the United States, with an estimated reach of 6.5 million listeners, uses Wasabi hot storage for costeffective, fast and reliable data protection for its business-critical multimedia content. Wasabi’s cloud storage service extends the broadcaster’s on premises networkattached storage (NAS) investments and eliminates the hassles and inefficiencies of tape-based data backup and recovery solutions.
Tags : 
wasabi, data protection, multimedia, recovery solutions, disaster recovery
    
Wasabi
Published By: Insight     Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
Tags : 
digital workforce, mobile worker, insight's connected workforce, intune, modern devices, end-user experiences
    
Insight
Published By: Sage People     Published Date: Nov 21, 2017
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape.
Tags : 
    
Sage People
Published By: DocuSign UK     Published Date: Aug 08, 2018
HR is all about serving your people, whether they are shiny new recruits or lifetime employees. But all too often, outdated and cumbersome paper-based processes get in the way of those goals. Discover how HR departments are using electronic signatures to streamline the on-boarding experience, increase employee satisfaction, and focus staff away from mundane tasks. Watch this webinar and discover how eSignatures can help you: - Simplify the new hire process: NDAs, offer letters, background checks and on-boarding - Streamline compensation and benefits: comp plans, stock option grants, and benefit plan notices - Reduce admin overheads: holiday requests, contractor agreements, and internal approvals - Ensure compliance: ISO compliance, new hire check-offs and audit support
Tags : 
    
DocuSign UK
Published By: Anaplan     Published Date: Mar 29, 2018
Finance has a mandate to become a strategic business partner. Integrated business planning offers organizations the ability to align operations and sales strategy with the company’s continuous financial performance. An increasing number of organizations have shown that even small steps toward integrated business planning have helped them deliver immediate benefits to the business, including light-touch forecasts, rapid “what-if” analyses, and more accurate budgets. Improved collaboration between departments, driving more awareness and shared understanding of potential issues, allows the business to take the prompt and incisive actions needed to keep performance on track. The question to consider is not “When are we going to do this?” but “Why don’t we start now?” because time is ticking away.
Tags : 
finance, business, planning, integration, strategy, company
    
Anaplan
Published By: Anaplan     Published Date: Mar 29, 2018
In recent months, leaders at some of the world’s largest consumer packaged goods (CPG) companies have spoken publicly about how ZBB is helping them save on overhead costs, which can then be used to reinvest in growth through innovation or bolster their margins. As consumers increasingly have more choices, these companies are finding their margins squeezed, and with direct expenses already trimmed back to the bare minimum, the only place to look is sales, general and administration (SG&A), and other overhead expenses.
Tags : 
zero, based, budgeting, investments, consumers, margins
    
Anaplan
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Start   Previous    255 256 257 258 259 260 261 262 263 264 265 266 267 268 269    Next    End
Search Resource Library