identify

Results 1 - 25 of 1081Sort Results By: Published Date | Title | Company Name
Published By: Brady Corporation     Published Date: Mar 30, 2017
In the Rail Vehicle Manufacturing any identifying label, marker or tag has to withstand aggressive solvents such as diesel without suffering losses in visibility or readability. Wide ranges of operating temperatures add to the demand for highly resistant identification products on wires and components in the Mass Transit Industry.
Tags : 
    
Brady Corporation
Published By: ForeScout EMEA     Published Date: Apr 28, 2020
Forescout researchers studied the devices and behavior of financial services networks to evaluate risk profiles and identify critical security issues. They leveraged the Forescout Device Cloud, which contains the anonymized fingerprints of more than 11 million devices connected to the networks of Forescout customers. The study, limited to 100 large Financial Services deployments, identified segmentation best practices and some surprising risk areas.
Tags : 
    
ForeScout EMEA
Published By: CheckMarx     Published Date: May 11, 2020
This Critical Capabilities guide provides application security testing (AST) tool buyers with vendor rankings for five common use cases, based on relevant evaluation criteria. Buyers can view vendor rankings for each use case to help formulate lists of vendors that, based on Gartner assessments, are well-suited based on product capabilities to address a given use case. Using the online interactive tool, buyers can also formulate custom use cases, and corresponding vendor rankings, where predefined use cases do not offer an appropriate match to an organization’s specific requirements. Using scoring for specific capabilities, buyers can also identify vendors with a product offering that is well-suited for a specific function, such as analysis of mobile applications or APIs.
Tags : 
    
CheckMarx
Published By: FICO - APAC     Published Date: Apr 22, 2020
This IDC Financial Insights study presents a vendor assessment of worldwide anti–money laundering (AML) solution providers in financial services using the IDC MarketScape model. The technology vendors provided: • An in-depth assessment of their current capabilities and strategies. • Their reference clients were interviewed to assess the vendor's ability to meet the financial institution's (FI's) strategic needs and current requirements. For the purposes of this document, IDC defined AML solutions to include solutions that provide financial institutions the capability to monitor their customers' transaction to identify suspicious activity, generate alerts, and facilitate the investigation of those alerts. Find Out why FICO Tonbeller leads the pack.
Tags : 
    
FICO - APAC
Published By: Group M_IBM Q2'20     Published Date: Mar 20, 2020
As security monitoring and analytics initiatives mature, a platform approach reduces the time to identify, investigate, and respond to security-related incidents — and drives a significant reduction in risk. Learn more about the success of a secure, compliant, and well-managed infrastructure.
Tags : 
    
Group M_IBM Q2'20
Published By: Jamf     Published Date: Mar 27, 2020
In today’s education environment, technology and learning go hand in hand. And with digital technology, learning is no longer confined to the classroom or traditional classroom hours. In the wake of a health crisis — and to best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. The ability to make this fully functional and efficient falls on IT and educators. But, with the right tools in place, remote learning can be as simple and intuitive as in-person. In our e-book, we identify five ways you can best serve students and teachers when you move learning online. We cover how to: Set expectations for students and teachers Facilitate engaging discussions daily Promote peer-to-peer interaction Offer active learning through projects and breakout groups Leverage apps and games
Tags : 
    
Jamf
Published By: Workday     Published Date: Mar 24, 2020
Why do today’s CIOs and CFOs need to embrace change together? Read this whitepaper to learn why technology and finance C-suite leaders are joining forces to identify technology solutions that enable growth and transformation in finance and accounting. Read the whitepaper.
Tags : 
    
Workday
Published By: McAfee EMEA     Published Date: May 12, 2020
As a senior consultant on the Foundstone Services incident response and forensic team, I regularly respond to a wide range of security incidents at client sites. I have assisted clients with the containment and eradication of malicious code (for example: ransomware and malware infections) and responding to unauthorized access/network breaches impacting their enterprise environment. During all of the responses, there was the need to identify the nature of the incident, assess the client’s security infrastructure, and work towards the identification of the threat or attack vector(s). The information gathered from the initial assessment and related analysis was then used to isolate and contain the malicious activity impacting devices within the environment. Connect
Tags : 
    
McAfee EMEA
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound
    
Nuance Communications
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: Nuance Communications     Published Date: May 28, 2010
Register today to view to the webcast Proactive Notifications for Financial Services: Using Automated Customer Communications to Manage Risk and Retain Customers.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: Ability Commerce     Published Date: May 18, 2009
It always surprises me that as eCommerce marketers we give lip service to the importance of testing, buy many of us don't take the time to fine-tune our email programs. If you are able to identify a few elements through testing that resonate with your customers and then employ those insights in your ongoing program, the improvements may be sustainable over time.
Tags : 
ability commerce, seo, email frequency, email test, lead generation, roi, pci, ecommerce
    
Ability Commerce
Published By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
    
SAP
Published By: Dell APAC - EMC     Published Date: May 25, 2020
As an IT decision maker, you’re focused on finding effective solutions you can implement quickly and efficiently to address the challenges specific to your business. Ensuring that security is built into every solution is critical from the start. That can mean: • Determining how to introduce new technologies to keep your growing workforce secure — wherever they work • Evaluating whether existing devices and infrastructure are vulnerable to attack, and how to close security gaps • Mitigating internal and external risks • Applying robust data-protection policies • And more A trusted partner can help you identify and deploy the technologies you need to keep devices, infrastructure and data more secure, so you can focus on daily routines and invest in innovation. Dell Technologies with Intel® is poised to be your go-to technology partner.
Tags : 
    
Dell APAC - EMC
Published By: Spirion     Published Date: Feb 26, 2020
In today’s world, data breaches are an increasingly common occurrence. The greatest financial damage typically comes when breaches expose sensitive data, such as social security numbers, credit card data, health information, business secrets, government records, and other valuable data that is costly to lose, especially when a breach captures the media’s attention. Once public, such breaches result in tens or hundreds of millions of dollars in post?breach losses. In this book, you’ll discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. You’ll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This book will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.
Tags : 
    
Spirion
Published By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Powerful IT doesn’t have to be complicated. Hyperconvergence puts your entire virtualized infrastructure and advanced data services into one integrated powerhouse. Deploy HCI on an intelligent fabric that can scale with your business and you can hyperconverge the entire IT stack. This guide will help you: Understand the basic tenets of hyperconvergence and the software-defined data center; Solve for common virtualization roadblocks; Identify 3 things modern organizations want from IT; Apply 7 hyperconverged tactics to your existing infrastructure now.
Tags : 
    
Hewlett Packard Enterprise
Published By: Intel Corp.     Published Date: May 15, 2018
Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Meet end- user expectations and enterprise IT requirements using PCs equipped with next- generation Intel Core vPro processors.
Tags : 
    
Intel Corp.
Published By: SAP     Published Date: May 18, 2014
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Coupa     Published Date: Dec 14, 2018
What P2P Leaders Do That You Can, Too Purchase-to-pay (P2P) organizations are under high-stakes stress. With constant changes in market volatility, fierce competition, and disruptive technology, P2P teams need to re-think their approach to balancing traditional cost concerns and emphasize agility. The question is: how? To help companies discover the answer, The Hackett Group looked at P2P organizations across a variety of industries and areas over a 12-month period to identify what top performers had in common—and what set them apart. Read this report to gain insight into three key areas: Ensuring stakeholder needs guide day-to-day decisions Digitizing information to increase availability and agility Automating processes to accelerate response to change
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
It seems strange to think that just a few years ago, the IT department was considered a supplier to the organization. Today, IT leaders are at the forefront of their companies’ march into the digital age. Technology is now recognized as a key enabler for achieving strategic business goals, including revenue growth, market expansion, and customer satisfaction; and IT leaders have risen to the challenge of simultaneously running the organization while identifying and leveraging innovative solutions that can drive growth.
Tags : 
it leaders, business goals, innovative solutions, customer satisfaction, infrastructure improvement
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 29, 2017
IT executives are in one of the most dynamic, challenging business environments of all time. The business expects speed; the IT function strives to keep up while pursuing innovation and efficiency. Many CIOs recognize that cloud is a possible solution to achieving both but they are uncertain about the best way to get there. Whether your company seeks to modernize IT, fuel innovation or accelerate growth, you’ll find that by identifying the most appropriate cloud journey for your organization, you can determine the best potential entry points to cloud migration as well as identify, prepare and prevent possible roadblocks. And, you’ll discover how the right cloud platform and partner can enable your success by leveraging different layers of the cloud to reach your desired business outcomes—and ultimately achieve true business transformation.
Tags : 
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.