it landscape

Results 176 - 200 of 675Sort Results By: Published Date | Title | Company Name
Published By: Optimizely     Published Date: Apr 06, 2018
Welcome to the conversion best practices toolkit from Optimizely! You’re already one step closer to delivering meaningful digital experiences and turning prospects into customers. In an increasingly competitive landscape where customers demand more from their digital interactions with companies across a growing number of communication channels, customer acquisition can be a big challenge. In this toolkit, you’ll find a variety of resources aimed at helping you identify conversion optimization opportunities and acquire new customers with greater efficiency.
Tags : 
    
Optimizely
Published By: Harvard Business School     Published Date: Mar 05, 2015
Why are more and more smart companies going VC to find their next breakthroughs? A corporate venture-capital fund for investing in outside startups can help a company see, understand, and respond rapidly to changes in the business landscape. In this Harvard Business Review article, HBS Professor Josh Lerner, faculty chair of the HBS Executive Education program Private Equity and Venture Capital, shares six ways to create a venture fund that’s as savvy and nimble as the best private VCs.
Tags : 
private equity, venture capital, investment expertise, vcs, corporate venturing, competitive threats, breakthroughs, corporate r&d, venture fund, corporate venture capital fund, startups, competitive compensation, knowledge transfer, fund goals, parent company, marketing, capital
    
Harvard Business School
Published By: Harvard Business School Executive Education     Published Date: Mar 09, 2015
For decades, large companies have been wary of corporate venturing. So why are more and more smart companies going VC to find their next breakthroughs? With corporate R&D units under pressure to focus on a narrow range of projects, companies often lack a good way to sniff out competitive threats beyond their main areas of expertise. A corporate venture capital fund for investing in outside startups can help a company see, understand, and respond rapidly to changes in the business landscape. But the parent company’s processes tend to bog down these funds.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management, asset management, financial strategy, investment opportunities, competitive advantage
    
Harvard Business School Executive Education
Published By: Adobe     Published Date: Sep 28, 2016
As the digital landscape evolves, marketing channels become more complex. That means that personalizing advertising campaigns across every channel is becoming even more crucial. Read Cross Channel Advertising with AMO to learn how managing advertising campaigns programmatically lets you deliver unique customer experiences while giving you the control and insight you need. Download our report to learn more about: • Search marketing standards across the US and UK in 2015 • The recent shift of consumer transactions on mobile devices • The next big trend in ad spend
Tags : 
adobe, cross channel, cross channel advertising, advertising, marketing, marketing channels, digital
    
Adobe
Published By: Clickatell     Published Date: May 20, 2008
In meeting the challenges of an increasingly competitive banking landscape, Standard Bank seeks to differentiate itself by providing the highest levels of service to its customer base. An integral part of achieving this goal has been its partnership with Clickatell to deliver personalized and relevant messaging to bank customers via their mobile phones.  Read this case study to learn more.
Tags : 
customer centric messaging, clickatell, standard bank
    
Clickatell
Published By: EMC Corporation     Published Date: May 27, 2014
Columbia Sportswear had a smooth downhill ride when it came to virtualizing their SAP landscapes, thanks to EMC and VMware. Watch this video to find out how EMC solutions helped Columbia migrate their operations to the cloud on their terms, and manage the system once it was in place.
Tags : 
emc, sap hana, vmware, virtualize sap, virtualize applications
    
EMC Corporation
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: QTS Data Centers     Published Date: May 02, 2017
The Internet boom of the late 90s and early 2000s launched a mass migration of enterprises seeking the benefits of IT outsourcing. The emergence of virtualized infrastructure and cloud computing created a new business landscape of opportunities along with escalating challenges in capacity and complexity.
Tags : 
    
QTS Data Centers
Published By: Infomatica     Published Date: May 19, 2015
In this eBook, best-selling author Brian Underdahl explores the fundamentals of data integration and how the latest tools can simplify today’s (and tomorrow’s) data landscape. “Data Integration for Dummies” provides valuable reference if you need to explain data integration to the business, are looking for an alternative to hand-coding data mappings, or simply interested in expanding your knowledge.
Tags : 
data integration, it infrastructure, data sources, data landscape, data mappings
    
Infomatica
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security, privacy, risk reduction
    
IBM Corporation
Published By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in today’s IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
    
HPE Intel
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
More so than ever before, agility matters. A shifting competitive landscape along with heightened customer demands, technological transformations, digital disruptions and a host of other trends, combine to create distinct challenges for business operations executives. Achieving and maintaining a competitive edge in this climate requires an advanced framework for pivoting whenever needed—with minimal cost, maximum efficiency and optimal outcomes. The question for every enterprise in the current environment: Do we have the required agility to drive decision-making capabilities that will continuously sharpen our competitive edge?
Tags : 
operational agility, technological transformations, digital disruptions, decision management
    
Group M_IBM Q1'18
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Cisco EMEA     Published Date: Jun 19, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. We’ve picked out five key stories because we think these threats, or similar ones, could appear again. To find out what these are download this whitepaper today!
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 19, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. We’ve picked out five key stories because we think these threats, or similar ones, could appear again. To find out what these are download this whitepaper today!
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Workday     Published Date: Feb 01, 2019
In today’s IT landscape, many organizations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions • If your company is ready to make the switch to SaaS From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Workday Italy     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Spain
Published By: HPE & Intel®     Published Date: Oct 10, 2016
In the financial services industry (FSI), high-performance compute infrastructure is not optional; it’s a prerequisite for survival. No other industry generates more data, and few face the combination of challenges that financial services does: a rapidly changing competitive landscape, a complex regulatory environment, tightening margin pressure, exponential data growth, and demanding performance service-level agreements (SLAs).
Tags : 
    
HPE & Intel®
Published By: Oracle     Published Date: Aug 08, 2013
With Oracle CRM predictive analytics, identify your best cross-sell and up-sell opportunities so you can focus on higher probability deals.
Tags : 
oracle, crm, opportunity landscape, predictive analytics, sales
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library