Whitepaper Library
 

it strategies

Results 1 - 25 of 906Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Workday     Published Date: Mar 02, 2018
An updated IT department for your government agency is becoming more accessible thanks to outside-the-box thinking, partnerships, and strategies. By focusing on the nine priorities in this guide, you can keep your government agency on the cutting edge of technology. View case studies, exclusive CIO interviews, and key tips.
Tags : 
updated it department, government agency, priorities
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
The new revenue recognition standard is going to shake things up in your business beyond just accounting. This new eBook from CFO, an Argyle company and sponsored by Workday—an early adopter—offers insight into preparing and planning for the new standard, along with strategies for meeting the new demands.
Tags : 
revenue, accounting, cfo
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Read this report from Workday and HMG Strategy to learn the critical strategies CIOs need to lead digital transformation in their organizations.
Tags : 
digital transformation, strategies, cio, hmg
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Read this report from Workday and HMG Strategy to learn the critical strategies CIOs need to lead digital transformation in their organizations.
Tags : 
cio, digital transformation, organizations
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Higher education must make changes to best prepare students for the shifting economy. This whitepaper outlines the skills needed in the workplace of tomorrow and strategies colleges and universities might consider to ready their students for what’s to come.
Tags : 
higher education, shifting economy, students, workplace
    
Workday
Published By: Uberflip     Published Date: Mar 16, 2018
When it comes to content production, marketers across the globe can let out a collective “we’ve got this.” Content marketing is now the cornerstone of most organizations’ marketing strategies. In fact, 91 percent of all B2B companies use content marketing. And 38 percent of North American marketers say they expect their content marketing budget to increase in the next 12 months. We’ve invested heavily in it because it works.
Tags : 
    
Uberflip
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Panaya     Published Date: Jun 01, 2018
Hear IDC Research Director for ALM Strategies explain how establishing effective agile approaches to software development, QA and testing, ensures software relevance, streamlines execution and increases release velocity. Join IDC guest speaker and Panaya experts to hear: › IDC Research Director, Melinda-Carol Ballou cover the latest ALM industry practices › Which ALM strategies bring greater agility to your backend system › How to implement these practices to achieve frequent, quality change releases
Tags : 
    
Panaya
Published By: Olapic     Published Date: Jun 05, 2018
Olapic is an innovator in visual content solutions, offering the technology and expertise to help brands create authentic, personalized, and effective customer experiences along their entire journey. Through user-generated content – content that is earned from consumers; influencer-generated content – content that is requested from specific creators; and enhanced branded content – existing image or long-form video content that is transformed into short form videos, Olapic helps brands get the right visual content, use it across marketing channels, and understand its impact on performance and ROI.
Tags : 
user generated content, content marketing, marketing trends, visual marketing, video marketing, brand building, brand marketing, social media marketing, customer marketing, increasing engagement, visual content, brand building, customer marketing, earned content, digital marketing strategies
    
Olapic
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Wave: Translytical Data Platforms, Q4 2017 report reviews companies that offer “translytical data platforms”, which Forrester defines as an “emerging technology” that delivers “faster access to business data to support various workloads and use cases.” Download the report if you want to learn: -Why Forrester named DataStax a leader among 12 companies it identifies as “the most significant translytical vendors. -What constitutes a “translytical data platform” and why translytical data platforms are so critical for enterprise data strategies today. Why performance, scale, security, and use-case support are the key differentiators."
Tags : 
    
Datastax
Published By: Epicor     Published Date: Jun 11, 2018
Focus on your best customers and minimize time wasted on unprofitable partnerships to maximize LBM business growth through the benefits of the trending practice of customer stratification. Epicor BisTrack Software, an LBM-specific business software, provides all the tools and information you need to implement customer stratification and reap the benefits of knowing your customer’s buying habits and successes. Download the e-book from Epicor to: 1. Understand the Benefits of Stratification 2. Explore The Four Customer Types 3. Ask Yourself These Important Questions 4. Apply Strategies to Maximize Results 5. Sustain Success With a Focus on Customers
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors, customer stratification, customer experience
    
Epicor
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Service Now     Published Date: Jan 26, 2018
The accelerating pace of technology innovation will offer organizations new opportunities to engage with customers as they build a digital business. Application leaders must be ready to translate habits of customer centricity into a new set of improved actions to support CRM and CX strategies.
Tags : 
    
Service Now
Published By: HireVue     Published Date: May 18, 2018
Recruiting leaders know that if their companies aren’t sourcing and hiring for diversity they are missing valuable talent and experience. This is one of the reasons diversity has been a focus area for improvement in recent years. Many organizations start with training. While diversity training is important for creating awareness, it doesn’t a¬ffect human behavior. A 2017 meta-analysis of studies investigating bias training confirmed this. Formal training can reduce unconscious bias, but it does not change behavior.13 This has put talent leaders in a di cult position. The way to make real progress on diversity hiring initiatives is by using systematic processes that apply data-driven decision making. With structured interviews and AI, you can overcome unconscious bias and make hiring more equitable for all candidates.
Tags : 
    
HireVue
Published By: Magento     Published Date: Apr 03, 2018
Getting customers to buy multiple items — and spend more money on each order—is a great way to increase sales and revenue. Here are five easy-toimplement strategies to get your customers to spend more in your online fashion store.
Tags : 
order, value, average, conversion, store, sales
    
Magento
Published By: Adobe     Published Date: May 15, 2018
The companies that are succeeding today are the ones that go beyond their products and services and create exceptional experiences. We surveyed industry leaders around the world to discover the top digital marketing trends and priorities. We’re sharing the results of the 2017 Digital Marketing Study in Running on Experience. Read the report to learn: What strategies and approaches set leaders apart from the rest Where companies in your industry are investing The four steps for digital transformation
Tags : 
    
Adobe
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data. This transformation is also amplifying competition. As analyst Mark Raskino notes, “As a consequence, all players rebuilt their strategies around the same time, and all have awakened to the power of digital business at the same time. Contention is therefore inevitable.”1
Tags : 
    
CA Technologies EMEA
Published By: Intouch Insight     Published Date: Apr 23, 2018
Customer Experience (CX) has become a critical differentiator for companies. Consulting company Forrester has declared that we are in the “Age of the Customer,” and Gartner argues, “A superior customer experience is one of the few remaining means of sustainable competitive differentiation as the effects of globalization take their toll.” Despite its widely-recognized importance, CX continues to be a loosely-defined concept, with each organization seeming to have its own definition. Approaches to the discipline and the arrangement of CX teams and related roles vary widely from business to business, leading to some confusion within organizations trying to select a CX approach. Whether you are just starting your company’s CX journey or you are well on your way, this white paper will help you develop a thorough understanding of the discipline and the many ways organizations view and implement CX strategies, processes, and technologies. We’ll start by defining customer experience and its im
Tags : 
    
Intouch Insight
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.