act

Results 1 - 25 of 12178Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Apr 24, 2018
Solid-state array features, pricing, scale and density are improving at a rapid pace, while agility and disaggregation benefits are providing long-term value. Gartner has analyzed 19 SSA products across five high-impact use cases to quantify what's important to infrastructure and operations leaders.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Box     Published Date: Jun 22, 2018
• Moving from legacy to cloud infrastructure is a huge win for business, but the process requires a fundamental shift in organizational culture and business processes both inside and outside IT. In fact, managing this change may be the biggest challenge your company faces when moving to the cloud, unless you're equipped with the resources that make for a simple, successful transition. • Here's our tried-and-true 3-step approach proving that change doesn't have to be hard. Download now to start your easy, secure and efficient move to the cloud.
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
Solid-state array features, pricing, scale and density are improving at a rapid pace, while agility and disaggregation benefits are providing long-term value. Gartner has analyzed 19 SSA products across five high-impact use cases to quantify what's important to infrastructure and operations leaders.
Tags : 
    
Hewlett Packard Enterprise
Published By: Zendesk     Published Date: Jun 29, 2018
Customers are more technically savvy than ever and have come to prefer the DIY approach to solving their issues and answering their own questions. Years of research by ICMI has confirmed that customers prefer to resolve issues themselves and within their channels of choice. Furthermore, customers only seek direct interactions when they unsuccessfully exhaust their self-service options. This is backed up by data from American Express, which found that 48% of consumers prefer to speak with a customer service rep when dealing with complex issues, but only 16% prefer the same contact for simple issues. The goal of this paper is simple: We want to help you build an all-in-one knowledge base, community, and customer portal. All of which can be accomplished with a help center like Zendesk Guide.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 29, 2018
Your door is always open, regardless of your business or support hours. Today’s customers ask questions at any time of the day or night and will wait for you to respond (but not for long). This poses a challenge to most businesses: How can you anticipate which channels a customer will need or want, and how can you determine whether these channels will be efficient for your organization? The short answer is: you do. Customers want the ability to contact businesses in more than one way, and they expect each brand interaction to be consistent with the one before and after. Learn how with Zendesk's Omnichannel solution.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 29, 2018
Zendesk Support helps you improve relationships with your customers and provide them with a seamless experience. Improve customer satisfaction, increase agent productivity, scale your support operation, and better manage your team. Watch the demo and take advantage of your support efforts to benefit your entire company.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 29, 2018
The start of a new chapter of your business, whether you're moving upmarket or adding products and features, is a great time to scale your customer service operations in a smart way. We know customers prefer self-service, via a knowledge base, if one is available. A Gartner report estimates that CIOs can reduce customer support costs by 25% or more when proper knowledge management discipline is in place. If you've been on the sidelines waiting to take the self-service leap, this white paper will prove that you and your agents already partake in the activities needed to offer great self-service, every single day.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 29, 2018
In the global market for customer service software, Zendesk is once again recognized as a leader in the 2018 Gartner Magic Quadrant for the CRM Customer Engagement Center. Every year, Gartner conducts a thorough analysis of service providers in the customer service and support application space. We believe the Gartner Magic Quadrant for the CRM Customer Engagement Center report provides valuable information for business leaders who seek technology solutions for interacting and engaging with their customers. Zendesk can again be found in the 2018 report’s Leader quadrant, which we consider a reflection of the success of our 125,000 customers, including enterprise clients like Airbnb, Tesco, and the University of Tennessee. The past year alone has included a number of significant milestones for us, including the release of AI-enhanced features for self-service and surpassing $500 million run rate in revenue. As our customer base continues to grow, we strive to be a dynamic vendor for bus
Tags : 
    
Zendesk
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
cybercrime, security, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Dell EMC     Published Date: May 04, 2018
Handle more orders with faster response times, today and tomorrow. Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Download this summary from Dell EMC and Intel® to learn more. • Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. New Possibilities Outside. • Please use this trademark line at the bottom of the landing page: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Hyper-Converged Infrastructure (HCI) systems bundle multiple technology components together into single systems, enabling IT departments to spend less time managing separate data center components and more time proactively delivering value to the business. In this white paper, we compare the portfolio offerings of Dell EMC and HPE, and highlight significant benefits to be realized when partnering with the HCI market leader: Dell EMC. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Dell     Published Date: May 04, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. Download this executive summary to learn ways to best upgrade PCs efficiently with effective solutions to meet the needs of the emerging workforce. Organizations who find this balance can turn their workforce into a strategic asset and gain a competitive advantage while freeing up IT resources to invest in other aspects of digital transformation. Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. Powerful Productivity Outside. The following trademark line should be used on the landing pages for this asset: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: