report

Results 1 - 25 of 3415Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Microsoft     Published Date: Oct 12, 2017
Customers expect more from brands when it comes to convenience, resolution times, and agent expertise. Evolving customer preferences are tightly linked to innovations in digital technology, and brands must embrace both in order to keep pace with heightened expectations. The good news is that brands that can deliver on expectations are rewarded with higher rates of customer retention and loyalty. The Microsoft 2017 State of Global Customer Service survey polled 5,000 people from Brazil, Germany, Japan, the United Kingdom and the United States. We continue to find commonalities along with distinct differences between locals. And though people in all age groups are embracing new digital trends, millennials especially are shaping the way brands need to think about the future of customer service engagement.
Tags : 
customer service, customer loyalty, digital trends, multiple channels, microsoft
    
Microsoft
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
As organizations seek to extract more strategic value from their data, many are starting to view data governance as an enabler of insight rather than an impediment to its creation. This report explores a leading approach to data governance and the impact it can have on today’s most data-rich organizations.
Tags : 
data governance, data-rich organizations
    
Group M_IBM Q1'18
Published By: Pure Storage     Published Date: Jan 12, 2018
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions. Computer systems consisting of multi-core CPUs or GPUs using parallel processing and extremely fast networks are required to process the data. However, legacy storage solutions are based on architectures that are decades old, un-scalable and not well suited for the massive concurrency required by machine learning. Legacy storage is becoming a bottleneck in processing big data and a new storage technology is needed to meet data analytics performance needs.
Tags : 
reporting, artificial intelligence, insights, organization, institution, recognition
    
Pure Storage
Published By: Quick Base     Published Date: Dec 18, 2017
Spreadsheets are good for number crunching – but many professionals use them to do things they were never meant for. The result? Long office hours, chasing down status updates, and compiling data manually. Learn the 5 signs of spreadsheet misuse and how to overcome them in this webcast.
Tags : 
audit, insights, accounting, ap management, compliance, finance, spreadsheets, collaboration
    
Quick Base
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM retained its position as a "Leader" in the 2017 Gartner Magic Quadrant for Application Security Testing. Read our complimentary version of the Gartner report to learn: Critical trends in the Application Security Testing market. Why IBM maintained a Leadership position in a report that spanned 18 Application Security vendors. Detailed criteria that determine how all of the vendors are positioned in the Magic Quadrant.
Tags : 
ibm, application security, gartner, application security testing
    
Group M_IBM Q1'18
Published By: LiveRamp     Published Date: Jan 02, 2018
Offrez une meilleure expérience à vos clients. Associez vos données offline et online et déployez-les de façon sécurisée sur des applications marketing pour améliorer l’efficacité de vos campagnes publicitaires. Pour obtenir plus d’informations, consultez notre Guide de 15 minutes sur le Data Onboarding (en anglais).
Tags : 
mesure, personnalisation, ciblage, reporting, marketing, digital, data
    
LiveRamp
Published By: IBM     Published Date: Oct 17, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive (MiFID2). Many of these new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data
Tags : 
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: Oracle OMC     Published Date: Nov 30, 2017
This white paper shares insights gleaned from Demand Gen Report’s own research, along with interviews with industry experts, to dispel five common myths associated with marketing automation. In doing so, it highlights the benefits of using this type of system, explores what it takes to unlock its range of potential, and explains how to apply marketing automation for personalized, buyer-centric marketing.
Tags : 
    
Oracle OMC
Published By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : 
datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
    
Mimecast ABM Q4
Published By: Epicor     Published Date: Feb 20, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
cloud, erp
    
Epicor
Published By: Epicor     Published Date: Feb 23, 2018
Whether your company wants to grow by optimizing your current business model or transforming to introduce new revenue sources, you’re likely exploring a variety of digital tools designed to enhance and expand the organization. Leaders rely on CIOs and IT directors to recommend digital strategies and outline the benefits and challenges they can expect from new digital tools. For many businesses, the first step toward growth is deciding how ambitious their digital strategy should be in order to compete and succeed in today’s manufacturing market. Technology leaders can help drive the company’s digital ambition by: • Considering whether the business can support full digital transformation or more moderate optimization • Observing digital trends across the industry and adjacent industries • Evaluating your competitive position as it relates to your digital strategies Learn more about how your company can determine its digital business ambition by downloading this research report from Gart
Tags : 
erp software, enterprise resource planning software, cloud, saas, digital
    
Epicor
Published By: Oracle     Published Date: Feb 21, 2018
Oracle earns a leadership spot in Gartner’s Magic Quadrant for Mobile App Development Platforms. Read this complementary report and learn how Oracle continues to build on its platform with chatbot support and expanded analytics, and to enhance its high-productivity development tool.
Tags : 
    
Oracle
Published By: Zendesk     Published Date: Jan 19, 2018
The start of a new chapter of your business, whether you're moving upmarket or adding products and features, is a great time to scale your customer service operations in a smart way. We know customers prefer self-service, via a knowledge base, if one is available. A Gartner report estimates that CIOs can reduce customer support costs by 25% or more when proper knowledge management discipline is in place. If you've been on the sidelines waiting to take the self-service leap, this white paper will prove that you and your agents already partake in the activities needed to offer great self-service, every single day.
Tags : 
customer support software, customer service tool, customer relationship, multichannel support tool, customer support vendor evaluation, knowledge base management, help desk software, help desk portal
    
Zendesk
Published By: Zendesk     Published Date: Jan 19, 2018
The future is unknown and the unknown can be both exciting and frightening. Thankfully, we believe Gartner’s new report, “Predicts 2018: CRM and Customer Experience”, can help prepare your business for the evolving world of CRM and the customer experience. According to Gartner, “By 2020, the CRM application software market will overtake the data management market, thus becoming the largest of all software markets.” With this in mind, it’s important for application leaders to take action to avoid losing out. Learn how you can plan your customer service organization more strategically and maximize your business' efforts.
Tags : 
customer support software, customer service tool, customer relationship, multichannel support tool, customer support vendor evaluation, knowledge base management, help desk software, help desk portal
    
Zendesk
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
The demand for databases is on the rise as organizations build next-generation business applications. NoSQL offers enterprise architecture (EA) pros new choices to store, process, and access new data formats, deliver extreme web-scale, and lower data management costs. Forrester’s 26-criteria evaluation of 15 big data NoSQL solutions will help EA pros understand the choices available and recommend the best for their organization. This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help EA.
Tags : 
nosql, market, industries, strategy, presence, vendor
    
AstuteIT_ABM_EMEA
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
ESG Lab evaluated the Zero Data Loss Recovery Appliance from Oracle with a focus on its ability to deliver reliable data protection by recovering Oracle databases to any point in time with sub-second RPO in a highly scalable scale-out solution that is easy to use and manage. Year after year, ESG respondents consistently cite improving data backup and recovery among the top IT priorities in our annual spending intentions survey (including 2016’s iteration). Why? Because when unforeseen infrastructure failures or data corruptions occur, the ability to restore not only business-critical information but also application and end-user access to that information become paramount. Lost or prolonged inaccessibility to business-critical data and applications most often means lost revenue and productivity to the business, and possibly the inability to meet regulatory requirements.
Tags : 
    
Oracle
Published By: Workday     Published Date: Jan 16, 2018
The shift from a product- to a service-driven economy—mixed with an uncertain economic climate—has given finance teams the opportunity to become strategic business partners capable of shaping and guiding organisational decision-making. This partnership is only possible by creating a deeper understanding of the contextual factors that influence revenue and profit and loss, and making this analytical data available to the right stakeholders when they need it. That requires a fundamental change in the way finance teams think about technology.
Tags : 
financial, profit, loss, reporting, business, revenue, optimization, workday
    
Workday
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: