Whitepaper Library
 

access

Results 1 - 25 of 2270Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Mar 02, 2015
Cobalt Data Centers operates a state of the art Tier III multi-tenant data center in the Las Vegas area that supports a broad customer base having a diverse and demanding set of requirements for security, reliability, and accessibility.
Tags : 
virtualization, cloud computing, infrastructure, design and facilities, power and cooling
    
Server Technology
Published By: Workplace by Facebook     Published Date: Sep 27, 2018
Young people have grown up in a world of instant access, with endless media, services, and products available in just a few taps of a smartphone. These Gen Yers will make up 35% of the global workforce by 2020. Download this info-graphic now to learn more about how the millennial expectation of immediacy will shape the future of work.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Sep 27, 2018
Technology is creating new expectations for openness within the workplace. Especially amongst a younger generation raised on mobile, messaging and instant access to information. Download this info-graphic now to see how Workplace by Facebook create a seamless experience inside the workplace with the use of openness and transparency.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Sep 27, 2018
Young people have grown up in a world of instant access, with endless media, services, and products available in just a few taps of a smartphone. These Gen Yers will make up 35% of the global workforce by 2020. Download this info-graphic now to learn more about how the millennial expectation of immediacy will shape the future of work.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Sep 27, 2018
Technology is creating new expectations for openness within the workplace. Especially amongst a younger generation raised on mobile, messaging and instant access to information. Download this info-graphic now to see how Workplace by Facebook create a seamless experience inside the workplace with the use of openness and transparency.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Zendesk Ltd     Published Date: Sep 11, 2018
Customers have caught on that support interactions are getting better. When they reach out, they’ve come to expect an instant response that says “we’re here for you”. When they want information, it’s expected to be accurate, up-to-date, and easily accessible. Essentially, they come to expect efficiency during support interactions. As a result, businesses are becoming more cognizant of their self- service offerings. Customers want to be left feeling empowered; it’s even better when they can do so on their own. Self-service saves time for agents, cuts down on organizational costs, and leaves the customer with a positive outlook of a brand. This eBook delves into how AI can enhance your customer self-service offerings with automatically-generated knowledge bases, content cues for your service agents, and chatbots.
Tags : 
customer service, customer experience, artificial intelligence, chatbots, self-service
    
Zendesk Ltd
Published By: Workday Italy     Published Date: Sep 20, 2018
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
    
Workday Italy
Published By: Workday Nordics     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
workday, workday technology, digital strategy, workday finance, hr cloud solutions
    
Workday Nordics
Published By: VMware     Published Date: Oct 02, 2018
The journey towards upgrading IT infrastructure is fraught with buzzwords and misinformation. In this special report, Gartner identifies the key challenges faced by infrastructure and operations leaders and provides strong recommendations for optimizing IT costs and investments. Submit the form to access the report and discover the ‘seven deadly sins’ I&O leaders must avoid in order to capture efficiency gains and produce strategic, outcome-driven results.
Tags : 
    
VMware
Published By: VMware     Published Date: Oct 02, 2018
VMware surveyed approximately 200 senior IT leaders at enterprise, commercial, and SMB organizations worldwide to shed light on the evolving role of IT. In the face of increased pressures, IT oganizations are needing to accelerate development and delivery of applications that power faster time-to-market for the business. In this paper, we chart the progress of CIOs, CTOs and other IT leaders and discuss the top challenges they face in building more nimble, responsive organizations to support their business objectives. We also show how data centre modernization can help organizations deliver the agility required to meet ever-increasing demands for faster innovation through a flexible, service-oriented IT model that employs both private and public clouds. Submit the form to discover the access this latest paper and set the pace in today’s digital economy.
Tags : 
    
VMware
Published By: Workday UK     Published Date: Sep 18, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
    
Workday UK
Published By: Workday     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
    
Workday
Published By: Evariant     Published Date: Aug 22, 2018
Health systems that implement CRM-based engagement solutions stand to achieve significant strategic gains, from acquiring and retaining patients to supporting more positive clinical outcomes to increasing referrals to member providers and practices. Driven by easy access to rich consumer data and analytic profiling, as well as patient encounter histories, CRM-based engagement centers optimized for healthcare enable health system CSRs to quickly offer personalized responses to consumer or patient inquiries via multiple in- and outbound media, including telephone, email, social, and web.
Tags : 
transforming, engagement, center, crm, health, systems
    
Evariant
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn't stop them from wanting to have a go. But making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 14, 2018
According to Forrester Research, "Enterprise data virtualization has become critical to every organization in overcoming growing data challenges," with faster access to connected data, self-service, and agility among the many benefits seen. In this report, Forrester analyzes past research and Forrester Wave reports, user need assessments, and vendor and expert interviews to evaluate the offerings of top vendors in enterprise data virtualization. In compiling the vendor rankings, the report reviews the current offering, strategy, and market presence for the 13 most significant vendors. They discuss where TIBCO ranks in the evaluation and positions TIBCO Data Virtualization as a leader in enterprise data virtualization Read The Forrester Wave™: Enterprise Data Virtualization, Q4 2017 report to learn more.
Tags : 
    
TIBCO Software APAC
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: ServiceNow     Published Date: Sep 18, 2018
Worldpay deployed ServiceNow Performance Analytics to replace multiple data tools and promote the use of analytics throughout its organization for improved decision making. Nucleus found the project enabled the company to boost analyst productivity, while simultaneously increasing data accessibility and engagement for hundreds of additional employees. Download this case study to learn more
Tags : 
nucleus, research, worldpay, servicenow
    
ServiceNow
Published By: HP Inc.     Published Date: Aug 31, 2018
o Hear from HP Retail Solutions VP and General Manager, Aaron Weiss on how innovative design and performance point-of-sale are merging to elevate the customer experience. A friendly, easy-to-use technology design is vital to the customer experience. Hardware that blends into its environment and is designed for customers to interact with, helps drive action and engagement. A slim, accessible device like the HP ElitePOS – powered by Intel® Core™ i5 processors – caters to the variety of needs that customers encounter throughout any retail experience.
Tags : 
    
HP Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.