eye

Results 476 - 500 of 501Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Feb 28, 2014
How are data centers becoming unwitting accomplices in advanced cyber attacks?
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, data warehouse, data protection, information security, security threats, fireeye platform, protecting data, cyber targets
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established, data exfiltration, lateral movement, file shares, business monitoring, security monitoring, organizational safety
    
FireEye
Published By: Adobe     Published Date: Feb 12, 2016
The new era in digital marketing requires knowledge, process and maturity. Over the past 6 years, we’ve surveyed companies around the world to understand their key marketing strategies and tactics. We’re sharing the latest findings in the 2015 Digital Marketing Survey Results report.
Tags : 
adobe, digital, digital maturity, digital marketing, analysis, research
    
Adobe
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
The role of the CMO is rapidly evolving as CEOs raise expectations about how marketing should contribute to company growth. Who are today’s CMOs, where did they come from, what do they do best and how do they do it? gyro, Forbes Insights and SAP surveyed more than 300 marketing executives to find out. Uncover answers and insights when you discover the unique traits that create a “growth CMO,” an elite marketer who successfully drives cultural change, builds marketing capabilities for the future and achieves compelling business results.
Tags : 
    
Tyco Integrated Security
Published By: Workforce Software     Published Date: Nov 23, 2015
In order to see the most benefit, organizations must lead with workforce management and they must do so with an eye toward three key issues: Ease-of-use and user adoption Specialization versus standardization Business alignment This paper will explore all three of these areas, and how organizations are leveraging the deep capabilities of modern workforce management technology as the first step of their HCM transformation.
Tags : 
workforce management technology, business alignment, workforce management software
    
Workforce Software
Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega
Published By: MuleSoft     Published Date: Sep 08, 2016
Between March 25th and March 28th, 2016, MuleSoft surveyed 802 IT decision makers globally across Australia, the Netherlands, Hong Kong, Singapore, Sweden, the United Kingdom and the United States. The survey assessed how organizations of all sizes are executing on digital transformation, IT challenges and technologies used to meet business goals.
Tags : 
mulesoft, digital transformation, it challenges, business goals, it innovation
    
MuleSoft
Published By: Flexera     Published Date: May 29, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Today’s IT departments have to both sustain existing operations and compete through innovation—but managing the IT tangle can starve investment in your future. How do you manage today’s Cloud First movement with one eye on the future? “Cloud First: threat or an opportunity?”—an exclusive webinar from Flexera VP Presales Cynthia Tackett—will discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. You’ll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Flexera     Published Date: May 29, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Today’s IT departments have to both sustain existing operations and compete through innovation—but managing the IT tangle can starve investment in your future. How do you manage today’s Cloud First movement with one eye on the future? “Cloud First: threat or an opportunity?”—an exclusive webinar from Flexera VP Presales Cynthia Tackett—will discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. You’ll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Hewlett Packard Enterprise     Published Date: Apr 01, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the insight Kawalec and Marshall Heilman of FireEye Inc. share in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Genesys     Published Date: Jun 08, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends.
Tags : 
customer service trends, customer service, growth, application development and delivery, customer experience, automation
    
Genesys
Published By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : 
data, breaches, organizations, global
    
LogRhythm
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: • Ensure end-to-end network visibility for your operations • Gain real-time analytics for application optimization and uptime • Scale your application infrastructure according to workload demand
Tags : 
    
Citrix ShareFile
Published By: Lookout     Published Date: Mar 30, 2018
Is your sensitive government data in danger due to a vulnerable mobile workforce? Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts your agency at risk. Read the report for the surprising findings.
Tags : 
    
Lookout
Published By: Zebra Technologies     Published Date: May 02, 2018
Consumers equipped with smartphones expect fast, convenient and uniquely relevant shopping experiences in store and online. As a result, one-third of shoppers are not satisfied with the in-store experience, turned off by everything from chronic out-of-stocks to cookie-cutter products and marketing messages that speak to the masses, as opposed to them as individuals. In turn, retailers are empowering front-line associates with tools designed to add newfound conveniences, such as locating inventory without having to leave a shopper’s side, to texting them curated product offers based on in-store and online buying patterns and preferences These are just a few of the insights found in Zebra’s 10th annual shopper study, which surveyed nearly 7,500 consumers from North America, Latin America, Asia-Pacific, Europe and the Middle East to gain a deeper understanding of shopper satisfaction and retail technology trends that are reshaping brick-and-mortar and online stores.
Tags : 
retail, mandate, shopper, vision, zebra, consumers
    
Zebra Technologies
Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage
Published By: VSP     Published Date: Sep 08, 2017
xx
Tags : 
    
VSP
Published By: Group M_IBM Q1'18     Published Date: Mar 06, 2018
Forrester surveyed IT profs in MMBs. Survey asked about current environment, factors driving investment & future investment plans for flash
Tags : 
flash, flash storage, storage
    
Group M_IBM Q1'18
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.
Tags : 
thousandeyes, device management, network devices, cloud applications, network monitoring, application performance
    
ThousandEyes
Published By: ThousandEyes     Published Date: Jan 14, 2018
Read how Network Intelligence equips your team to deliver predictable digital experience in the cloud era.
Tags : 
thousandeyes, network intelligence, business application, application performance management, cloud applications
    
ThousandEyes
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing for enterprises. To protect company and customer data, it is increasingly necessary for enterprises to revisit how they approach endpoint security. Read the research brief to uncover key trends in enterprise security, and how IT can protect their enterprise through a more secure and managed web browser.
Tags : 
    
Google Chrome Enterprise
Published By: Trustpilot     Published Date: Oct 25, 2018
Online reviews have the power to make or break your business’ image and credibility. To better understand what drives people to leave reviews, whether positive or negative, we surveyed over 1,000 consumers globally and put together a report with the findings. Download the report to learn: • What motivates people to leave negative reviews • What experiences most inspire positive reviews • The long-term impact on your business of satisfying an unhappy customer Get your free copy now!
Tags : 
    
Trustpilot
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.