web

Results 326 - 350 of 4325Sort Results By: Published Date | Title | Company Name
Published By: Teradata     Published Date: Jul 07, 2015
Learn the need for analytics, as well as trends in the government transportation marketplace, from public and private sector experts in this educational webinar by GovLoop and Teradata.
Tags : 
    
Teradata
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Nov 10, 2016
There are a variety of reasons to consider a hybrid approach, but is it the right path? If moving to the cloud, why not go all in? This webinar explores moving UC to the cloud, the advantages of a full UCaaS) deployment, and the issues a hybrid approach injects into the mix.
Tags : 
    
8x8 Inc.
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Oracle     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
    
Oracle
Published By: Oracle     Published Date: Nov 22, 2018
It is easy to get overwhelmed by the plethora acronyms (RTBs, DMPs,DSPs, SSPs, 1PD, 2PD, 3PD) and knowing when each of them come into play. Driven by data, Programmatic empowers modern marketers with the intelligence required to serve highly personalized ads. By bringing together First, Second and Third Party data at scale, you can target with increased precision and optimize campaigns in real-time. With tech platforms consistently pushing the boundaries of what’s possible in digital advertising, the time for marketers to lean into programmatic is now. Watch this 20 minute webinar with Mandar Dadegaonkar, an award-winning digital marketer and learn from his experience-based advise on: • how to get started and use programmatic tactics that work • insider secrets to boost ROI and improve campaigns • potential pitfalls to watch out for • guidelines for measurement and analytics
Tags : 
    
Oracle
Published By: Akamai Technologies     Published Date: Nov 30, 2016
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
Tags : 
akamai, ddos, web application attacks, ntp, akamai intelligent platform
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : 
apts, understanding apts, apt security strategy, stages of advanced threats
    
Websense
Published By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : 
business models, innovation, omni channel, ecommerce, commerce platform, retail
    
SAP
Published By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : 
business models, innovation, omni channel, ecommerce, commerce platform, retail
    
SAP
Published By: Oracle Corp     Published Date: Oct 02, 2012
Why the Secret to Loyalty is Customer Experience
Tags : 
free webinar, customer, oracle, loyalty, crm, customer care
    
Oracle Corp
Published By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : 
software, asset management, software asset management, webinar
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 12, 2013
"Learn how savvy enterprises, like Tickets.com, Verisign and Omnicare, use ServiceNow as a platform to enable business users to rapidly create applications with IT’s full guidance and support. During this webinar, you will discover how ServiceNow is enabling organizations to increase their competitive agility, user satisfaction and productivity, all while enhancing IT's value to the business."
Tags : 
servicenow, automation platform, service automation platform, webinar
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 18, 2013
"We will show you the power of the ServiceNow single system of record through some easy-to-follow demonstrations. This webinar includes demonstrations of: • Incident, Problem and Change Management • Service Catalog & Self Service • Performance Analytics "
Tags : 
servicenow, enterprise it, service automation, applications, webinar
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 18, 2013
To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being the department of no to the department of now.
Tags : 
servicenow, enterprise it, service automation, applications, webinar, customer relationships, perception of it, change management, customer value, marketing it, it service management, service relationship management, evolution of service, applications, custom applications
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 18, 2013
Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.
Tags : 
configuration management, data certification, product management, servicenow, enterprise it cloud, it cloud company, infrastructure applications, management applications, operational applications, identifying configuration items, defining configuration items, integration, webinar, data quality
    
ServiceNow
Published By: Dell     Published Date: Nov 09, 2017
How to empower your workforce and IT. Access this short webcast to hear how new workforce trends have created a paradox between employees desire for greater flexibility and IT's need to control cost and data. Luckily, with a reliable partner like Dell, you can take advantage of our entire Lifecycle Services and Endpoint Security to make both groups happy while still cutting costs. In this webcast you'll hear... - What workforce trends have impacted employee expectations of technology - How IT can balance costs and security with employee happiness - How to apply this approach to the 4 phases of the PC Lifecycle - What solutions can help you save up to 25% of PC Lifecycle costs Watch on-demand now.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 13, 2017
In-house PC deployments can be expensive and time consuming and often times result in manual errors, short and long term support challenges, as well as delays in production system deployments. But new deployments don’t have to be hard. In this webinar, you will: 1. Learn about our newest client PC deployment offer ProDeploy Client Suite 2. Understand how we put our customers in control with the self-service portal TechDirect 3. Find out how ProDeploy Plus can help companies save up to 35%* on deployment time *Based on May 2016 Principled Technologies Report commissioned by Dell. Testing results extrapolated from a 10-system deployment to project time savings for larger deployment compared to in-house manual deployment. Actual results will vary.
Tags : 
    
Dell
Published By: Dell     Published Date: Feb 07, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: May 08, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library