rsa

Results 601 - 622 of 622Sort Results By: Published Date | Title | Company Name
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
    
Rsam
Published By: Oracle     Published Date: Apr 16, 2018
Los líderes empresariales quieren que los gestores financieros asuman el papel de conductores proactivos del negocio. Pero tu equipo ¿está preparado para esto? Ve cómo las soluciones de Finanzas de Oracle pueden apoyar la Jornada de la Modernización Financiera con tecnologías innovadoras que impactan directamente los procesos de negocio, ofreciendo alto desempeño, agilidad y evolución con diversas funcionalidades cada vez más alineadas a las necesidades de los usuarios de negocio.
Tags : 
como, aumentar, agilidad, equipo, financiero, reducir
    
Oracle
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: Genesys     Published Date: Jul 13, 2018
When building artificial intelligence (AI) into your business strategy, it’s easy to become distracted by all the new technologies on the market—each one promising a better customer experience. Make decisions based on facts, not misconceptions. When you evaluate AI technologies, consider these facts: • Bots working with human agents enables a seamless customer journey • Automated self-service costs as little as 20 cents per interaction • A single platform makes it easier to deliver personalized, proactive and predictive experiences See how AI connects customer conversations in this new analyst guide, 2017 ContactBabel Inner Circle Guide to Self-Services.
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jul 13, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jul 13, 2018
In today’s digital world, the messaging and texting that have become a prominent part of most people’s lives are a form of asynchronous messaging. These are a simple, convenient method of communication for people on the go, with varied time in response based upon intrigue and urgency. Asynchronous messaging has become so ingrained in consumers’ lives, an expectation has evolved that businesses should be able resolve issues just as quickly and easily, and on the customer’s timetable. To keep up with consumer expectations and offer differentiated customer experiences, there is a strong case for implementing capabilities where messages can be fielded by bots using artificial intelligence, with a human touch through skilled representatives, or a combination of both within the same conversation, without losing context. Download this white paper to learn about: • 6 benefits to asynchronous messaging in B2C customer experience and operations • Incorporating asynchronous messaging into your u
Tags : 
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This Frost & Sullivan report sparks IT infrastructure economics conversation and fosters expert decisions with the following insights: 6 myths about IT financials debunked 3 basic tenets of IT the CFO needs to understand 2 tables assessing IT options from a TCO and business goals perspective"
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Published By: HP Inc.     Published Date: Aug 30, 2018
At HP, we know that in retail and hospitality environments, customers expect a fast and simple way to find information or to complete a transaction. The physical point-of-sale experience must rise to meet the demands of retailers through high aesthetic value and peak performance. From an elegant hotel to a small boutique, a quick-service restaurant to an outdoor garden center—all of these locations require a point-of-sale device that meets specific needs while appealing to any user. My team at HP sought to elevate this experience by redefining the customer experience through a versatile, reliable, and beautiful point-of-sale system. For the new HP ElitePOS, we gained insights from everywhere—designers, technologists, retailers, and consumers—to create a product that is beautifully simple. It started as a sketch on a napkin, and is now part of an iconic portfolio that dissolves barriers during point-of-sale customer interactions.
Tags : 
    
HP Inc.
Published By: Excellus BlueCross BlueShield     Published Date: Sep 18, 2018
What’s the secret to getting the most out of your High Deductible Health Plan (HDHP)? Getting comfortable talking to your doctor about costs. When you have healthy conversations about procedures, prescriptions, and general costs, you will find new ways to save money that you never knew existed. Want to know how to get more out of your HDHP? Just ask.
Tags : 
hdhp, excellus, preventive care, health savings, health insurance, health benefits
    
Excellus BlueCross BlueShield
Published By: Adobe     Published Date: Sep 21, 2017
"Download our Email Comes of Age guide so you can make every conversation engaging — including awkward ones. You’ll learn how to transition from pushing products to pushing the customer’s needs first — so that you’ll always give them the content they crave. Read our guide to learn how you can: --Know your customers better by integrating more data --Ensure every email reaches the inbox --Delight customers with personalized experiences"
Tags : 
    
Adobe
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: LifeLock     Published Date: Jan 17, 2018
Regardless of the workforce demographic, LifeLock is a universally relevant benefit for all employees because everyone has an identity to protect.
Tags : 
    
LifeLock
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
The Dell EMC All-Flash storage solution is versatile like a swiss army knife. They have a full suite of best-of-breed products that provide organizations the flexibility to meet their data storage requirements. They allow organizations to customize and choose across best-of breed solutions to meet their needs.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America ist der führende Anbieter erstklassiger Gesundheitsleistungen für Patienten mit Nieren- und anderen chronischen Beschwerden. In den USA leben 640.000 Personen mit Nierenerkrankungen im Endstadium. Mehr als drei Millionen Menschen weltweit leiden an chronischem Nierenversagen. Über das branchenführende Netzwerk von 2.200 Dialysezentren in den USA, ambulanten Herz- und Gefäßlaboren und Notversorgungszentren – sowie Nordamerikas größtes Angebot an Krankenhaus- und Postakut-Versorgungsanbietern – sorgt Fresenius Medical Care North America für die koordinierte Behandlung für mehr als 180.000 US-amerikanischen Patienten.
Tags : 
    
Dell PC Lifecycle
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: PGi     Published Date: Jan 24, 2019
Vous n’envisageriez pas une conversation téléphonique cruciale avec un investisseur, un événement clients ou une réunion avec une partie prenante qui aurait lieu dans l’aire ouverte de votre bureau. Alors pourquoi organiseriez-vous un évènement virtuel important sur une plateforme dont les caractéristiques favorisent la collaboration et le travail en équipe pour un petit groupe ?
Tags : 
    
PGi
Published By: Attunity     Published Date: Nov 15, 2018
With the opportunity to leverage new analytic systems for Big Data and Cloud, companies are looking for ways to deliver live SAP data to platforms such as Hadoop, Kafka, and the Cloud in real-time. However, making live production SAP data seamlessly available wherever needed across diverse platforms and hybrid environments often proves a challenge. Download this paper to learn how Attunity Replicate’s simple, real-time data replication and ingest solution can empower your team to meet fast-changing business requirements in an agile fashion. Our universal SAP data availability solution for analytics supports decisions to improve operations, optimize customer service, and enable companies to compete more effectively.
Tags : 
    
Attunity
Published By: Kustomer     Published Date: Aug 27, 2019
Differentiating your customer service starts with one thing: improving the agent experience. Learn the importance of empowering service teams with better processes and technology, to focus on delivering the type of support that builds trust, loyalty and economic value.
Tags : 
'customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”
    
Kustomer
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.