cio

Results 1 - 25 of 1446Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"Phishing is a well-known attack vector in the financial and security industry space. The data shows that, in addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period, putting the personal data and banking information of financial services customers at risk. Despite massive amounts of effort poured into awareness campaigns, phishing still remains a top threat to financial services organizations including: • 50% of all the unique organizations impersonated by tracked phishing domains were from the financial services sector. • 6% of global malicious login attempts targeted the financial • Financial services industry accounted for 14% of all unique targets between 2017 to April, 2019 Read the 2019 State of the Internet / Security Financial Services Attack Economy Report to learn about lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets"
Tags : 
    
Akamai Technologies
Published By: Genesys     Published Date: Jan 15, 2020
La Internet ha abierto un abanico de oportunidades y de información nunca antes visto, además de brindar un gran nivel de conveniencia a los clientes. Esto ha impulsado a las empresas a actualizar sus estrategias de customer engagement. Uno de los cambios más significativos ha sido la cantidad cada vez mayor de canales que los clientes utilizan para contactarse con las empresas. Ahora, se comunican por correo electrónico, chat, redes sociales, SMS y servicios de mensajería. Dado que la conectividad móvil ha redoblado aún más la apuesta, los clientes esperan que los contactos y las respuestas sean en tiempo real. En este informe, Frost & Sullivan analiza el valor de la experiencia del cliente para los call centers medianos en relación con su impacto para el negocio, las prioridades, la madurez tecnológica y la forma en que miden sus iniciativas de CX. En este informe de investigación global, usted conocerá: Las tendencias que tienen una mayor repercusión en el negocio de los call ce
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jan 15, 2020
Los clientes de hoy quieren que sus interacciones entre canales sean rápidas y no presenten problemas. Empresas globales como PayPal, Heineken y Vodafone han adoptado tecnología para brindar a sus clientes experiencias verdaderamente conectadas y omnicanal. Al migrar a la mejor plataforma de experiencia del cliente, han logrado: Cumplir los tiempos establecidos en la migración hacia la nube Cumplir los requisitos regulatorios específicos de su industria Reducir los costos de mantenimiento y operación Optimizar el personal Acelerar la obtención de valor y el ROI Mejorar el Net Promoter Score, la satisfacción del cliente y la resolución de las llamadas Conozca los cuatro pasos para planificar y ejecutar una estrategia de migración sin problemas, y hacer realidad la transformación de la experiencia del cliente.
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jan 15, 2020
Implementar inteligencia artificial (IA) es una de las acciones más importantes que puede darle a su negocio una ventaja competitiva hoy y a largo plazo. Marque una gran diferencia con las soluciones de IA combinada de Genesys. La capacidad de automatizar información, procesos, insights y tendencias —y añadir el toque humano— está incorporada en cada elemento de nuestra cartera de productos. Lea este eBook, descubra las capacidades únicas de IA que ofrecemos, y vea cómo nuestros clientes: Reducen un 30% el abandono de carros de compras. Enriquecen la experiencia del cliente. Alcanzan los KPI fundamentales.
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jan 15, 2020
El éxito se define por la calidad de las relaciones con sus clientes. Una estructura antigua puede afectar su capacidad de brindar un servicio consistente en todos los canales y puntos de contacto. Frente a las crecientes exigencias de los clientes y del negocio, usted no puede esperar a ver qué opciones a largo plazo le ofrecerá un proveedor y cuándo lo hará. Una forma de optimizar el customer engagement en los canales que tiene es incorporar soluciones de experiencia del cliente comprobadas y líderes en el mercado. Y, con un socio que se centre en la innovación y en su éxito, puede garantizar el futuro del negocio a medida que evoluciona. Lea este resumen ejecutivo y descubrirá cómo incorporar una plataforma de experiencia del cliente abierta, estable y comprobada, y seleccionar un proveedor que lo acompañe. Descubra las ventajas de una metodología de migración demostrada que lo guiará en el proceso de transformación de la experiencia del cliente, que incluye: Sentar una base sóli
Tags : 
    
Genesys
Published By: Workday     Published Date: Dec 19, 2019
Align data and analytics with your digital strategy. Successfully incorporating data and analytics (D&A) into your digital strategy can be a struggle. If D&A investments seem to fall short of expected results and you’re having trouble knowing which investments to make, you’re not alone. CIOs and CDOs will have to make data-driven decisions to create efficient D&A platforms. This report from Gartner can help. Read it to learn how you can: Use decision-making models to choose D&A investments Collaborate with digital business stakeholders Identify your organization’s data and analytics needs
Tags : 
    
Workday
Published By: A-lign     Published Date: Dec 04, 2019
In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats. While these concerns used to be left to the roles such as the CIO, CTO, CISO or IT department, is it now the responsibility of executives across the organization to keep it secure and lead by example for the rest of the team.
Tags : 
    
A-lign
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
La trasformazione digitale favorisce la crescita esponenziale dello storage enterprise - richiedendo un approccio sostanzialmente nuovo nella costruzione e nella scalabilità delle infrastrutture.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
La trasformazione digitale è un acceleratore di business che, fra le altre cose, sta portando ad un aumento della domanda per ottenere prestazioni migliori e una maggiore capacità di archiviazione. Tale domanda fa sì che le aziende debbano riesaminare la loro strategia di storage, poiché l’aumento della capacità storage non coincide con i sempre minori budget a disposizione del settore IT. Per poter sostenere lo sviluppo della propria attività commerciale e rimanere competitivi all’interno di un mercato digitale globale, ai CIO viene chiesto sempre più spesso di “fare di più con meno risorse” e, al contempo, di migliorare prestazioni e disponibilità.
Tags : 
    
Infinidat EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our 2018 Annual Cybersecurity Report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months. Report Includes: * The evolution of malware, including the developments behind network-based ransomware * Tactics adversaries are using to evade detection, namely, weaponizing cloud services and other technology used for legitimate purposes * Developments in malicious encrypted web traffic * Updates on how DDoS “Burst attacks” are increasing in complexity, frequency, and duration * Recommendations for defenders
Tags : 
    
Cisco Umbrella EMEA
Published By: Lenovo - StudioNorth     Published Date: Jan 13, 2020
Computing devices are rising to the challenge. They are more flexible and offer increasingly expanding functionality. That’s good news — CIOs can be assured that the newest devices can handle the demands of technologies such as VDI (virtual desktop infrastructure), AR/VR, and high-resolution imaging. However, new devices must also meet increasing regulatory compliance and requirements for secure, hack-resistant patient data access.
Tags : 
    
Lenovo - StudioNorth
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http
    
NEC
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
Published By: OneUpWeb     Published Date: Nov 23, 2010
Does social media marketing really work? How do you separate fact from fiction as you navigate your way through the buzz about "going viral"? Amidst the chatter about Twitter, Facebook, FourSquare, Digg, Delicious, and Linked In-what will really get your business ahead? Tune in to find out as Oneupweb CEO Lisa Wehr and Social Media Director, Maureen Michaels team up to unveil the truth.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics
    
OneUpWeb
Published By: Imperial Metals     Published Date: Nov 24, 2009
Precious metals like Gold and Silver can help you secure your future and meet long-term investing goals. In the last decade, Gold prices rose by an average of 40% per year! Our free IRA guide will show you how easy it is to invest in precious metals
Tags : 
imperial metals, ira, gold, silver, precious metals, 401k, equities
    
Imperial Metals
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
Published By: SAP     Published Date: Mar 09, 2017
Learn how CIOs can set up a system infrastructure for their business to get the best out of Big Data. Explore what the SAP HANA platform can do, how it integrates with Hadoop and related technologies, and the opportunities it offers to simplify your system landscape and significantly reduce cost of ownership.
Tags : 
    
SAP
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.