eye

Results 101 - 125 of 497Sort Results By: Published Date | Title | Company Name
Published By: Rackspace     Published Date: Apr 02, 2019
Traditional retailers seeking to digitalize their brand connections to customers, do so with Eagle Eye AIR, a SaaS platform for creating intelligent, real-time digital and mobile solutions for promotions, loyalty programs, rewards and more. With rapid business growth, the volumes of transactions processed per second are constantly being rewritten – yet, its customers’ transactional throughput keeps running smoothly – which is all thanks to the successful migration of its dedicated infrastructure to Google Cloud Platform (GCP). Being a longstanding customer of Rackspace, Eagle Eye trusted the Rackspace Managed Services team in providing expert guidance for every stage of its migration project – which is part of a bigger exercise to transform its technical capabilities.
Tags : 
    
Rackspace
Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Since when did budgeting become a process that companies dread? Just say the word “budget,” and you’ll elicit at least a few groans or eyerolls from teams outside of finance. It’s daunting: the weight of the next few years rests on a couple of forecasts, financial projections and line-item lists. As a result, cross-functional teams are under a lot of stress to ensure that their cases and arguments are heard. In some ways, the budgeting process almost feels combative.
Tags : 
hoovers, finance, budgeting, cfo, data, risk assessment
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 08, 2016
Did you know that the average health of marketers’ data is only “questionable?” Dun & Bradstreet analyzed 695M customer contact records and surveyed more than 500 B2B marketers to provide the truth about the state of B2B marketing data. Download the fourth annual report to discover how you can turn improved data quality into a competitive advantage. • The trends and pitfalls every data-driven marketer needs to know • The true state of B2B marketing data quality • Benchmarks for assessing your own data quality • Dun & Bradstreet’s research of B2B marketers’ data-fueled priorities for 2016 Do you have the data strategy you need to deliver on your marketing goals? Download the B2B Marketing Data Report to find out!
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
When the right approach is applied, analytics can drive more effective marketing strategies. While marketers understand the role analytics plays within the organization, most are not leveraging analytics to really drive enterprise performance. We surveyed 100+ business leaders to understand the state of analytics maturity across today’s leading organizations, uncovering common challenges teams are facing in their quest to use data and analytics to deliver a competitive advantage. What We Uncovered: - 73% of analytic professionals claim to work for an analytically-driven company - Only 42% of companies have a strategy for using analytics across the enterprise - Just 38% of companies share results of their analytic insights outside their department - 81% of organizations rely on 3rd parties for at least some portion of their analysis Download the report to learn how marketers, like yourself, view themselves in light of using analytics to drive their business.
Tags : 
hoover's, marketing strategies, analytics, data
    
Dun & Bradstreet
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation
    
Kaspersky Lab
Published By: Rosetta Stone     Published Date: Mar 22, 2012
MarketBridge, a leading global provider of sales and marketing services, surveyed 493 senior and upper management-level business professionals in a variety of functional roles at leading international corporations to learn more about their company's language-learning needs. Please download this free white paper for more information.
Tags : 
bilingual, human resources, rosetta stone, global human resources, business research
    
Rosetta Stone
Published By: Workday     Published Date: Mar 02, 2018
Higher education is in financial crisis, according to 71 percent of chief business officers (CBOs) surveyed by Inside Higher Ed. Read the 2017 report to understand how these leaders view the financial and other challenges facing higher-education institutions in the U.S.
Tags : 
higher education, financial crisis, financial challenges
    
Workday
Published By: Workday     Published Date: May 09, 2018
The 8th Annual CFO Alliance Sentiment Study surveyed more than 500 senior financial executives from public and private organizations across industries nationwide on anticipated challenges, focuses, and evolving landscapes of the C-suite and broader organizational hierarchy in the middle market. Read report.
Tags : 
    
Workday
Published By: Damballa     Published Date: Nov 13, 2012
How Advanced Malware Morphs to Remain Stealthy and Persistent
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Cisco Systems     Published Date: Jun 27, 2013
To help us understand what business leaders think about ‘the cloud’ and the impact of cloud collaboration to their businesses, we asked Forbes Insights to conduct research. In response, Forbes surveyed over 500 senior executives from global companies with sales ranging from $250 million to over $20 billion, and interviewed 15 executives. The study examined the ways business leaders increasingly look at cloud collaboration as a way to increase productivity, accelerate business results, and enhance innovation and collaboration across borders and functions.
Tags : 
cloud, collaboration, technology, business leaders, perspective, results, productivity, innovation
    
Cisco Systems
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Kaseya     Published Date: May 13, 2015
TechValidate invited IT Professionals to participate in a survey regarding virtualized environments.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care: How built-in data encryption keeps your PHI, DICOM studies safe Why more security pros are concerned with user behavior than cloud tools What your organization should know about the cloud and compliance
Tags : 
healthcare, data security, cloud software, privacy, patient care
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : 
cloud, cloud security, encryption, security, mobility
    
Citrix ShareFile
Published By: Google Analytics 360 Suite     Published Date: Sep 05, 2017
Today’s meandering customer journeys take place over multiple channels and devices. Each interaction creates a stream of digital information, leaving marketers with a growing pile of data. But, with data seemingly everywhere, why are so many marketers still feeling like there’s not a drop to drink? Leaders Have a Data Strategy and Enable More Teams with Data In this research report from June 2017, Econsultancy surveyed more than 700 marketing and analytics executives at consumer brands to better understand how data factors into marketing strategy — and daily decision making. Two-thirds of leading marketers — those who outperformed their top business goal — say they currently have a documented data and analytics strategy. In this report, you’ll also learn how leaders have built data-driven cultures and why they are more likely to use: digital analytics to optimize user experience in real time audience-level data to personalize customer experience customer-level data to segment and r
Tags : 
    
Google Analytics 360 Suite
Published By: PwC     Published Date: Jun 14, 2018
PwC’s Strategy& Fit for Growth Index Profiler surveyed more than 1900 executives from companies of all sizes around the world to understand how well they align their strategy and cost agenda
Tags : 
    
PwC
Published By: InMoment     Published Date: Aug 08, 2019
For our 2019 CX Trends Report, InMoment surveyed both consumers and brands to understand the alignments and disconnects in how well or poorly customer experience is delivered. While there are some bright spots, the overall takeaway is that most brands are still struggling to find ways to do right by their own needs while also serving the evolving needs and expectations of their customers.
Tags : 
    
InMoment
Published By: InMoment     Published Date: Aug 08, 2019
InMoment surveyed 1,300 U.S. consumers to understand the state of trust and loyalty, as well as customer perception about retailers’ attemps to offer more experiences versus simple transactions.
Tags : 
    
InMoment
Published By: Sage People     Published Date: Jan 29, 2018
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organisations to explore their views on these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals.
Tags : 
    
Sage People
Published By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
Published By: Taleo     Published Date: Apr 15, 2009
Alignment Drives Employee Engagement and Productivity: By a two to one margin, companies surveyed in a Taleo Research study reported the largest risk to their company's bottom line and brand is low employee engagement and productivity.
Tags : 
taleo, human resources, us business, talent, intelligence, business managers, goals
    
Taleo
Published By: Sophos     Published Date: Mar 30, 2017
Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read this paper to learn more about exploits and how to stop them. We’ll explore how exploits work, the exploit industry overall, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organization against advanced and unknown threats.
Tags : 
malware, antivirus solutions, exploit protection, security software, exploit kits, software protection, backdoor protection
    
Sophos
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.