client

Results 351 - 375 of 1051Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, encryption, efficiency, compliance
    
Citrix ShareFile
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Published By: HP Inc.     Published Date: Jul 17, 2017
HP builds large-format inkjet printers for corporate clients, print service providers and others with high print volumes. Purchasing a printer in this category is an important decision. HP’s latex technology offers excellent quality and reliability and, with the right print volume, outstanding economics. The engineers who build HP’s 2D printers began thinking about how they could use 3D printing to help reduce costs and innovate more quickly.
Tags : 
3d printing, 3d design, digital materials, 3d prototyping, product design, print services, hp technology, printer, print solution
    
HP Inc.
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
La compliance con il GDPR può essere ottenuta attraverso una combinazione di persone, processi e tecnologia. Questo documento illustra soluzioni che possano aiutare le aziende nel loro percorso verso la compliance con il GDPR. Ma è possibile estendere la protezione e rafforzare ulteriormente i controlli di sicurezza attraverso l'autenticazione forte e del rischio o la workload automation, per automatizzare l'elaborazione dei dati personali, facilitando il rispetto del GDPR e di normative analoghe. Le normative tendono a stabilire i requisiti minimi richiesti ma, nell'application economy, le aziende aperte devono garantire la due diligence per proteggere una delle risorse più importanti e critiche: le informazioni private dei clienti.
Tags : 
crescita esplosiva, silos di identità, nuovi requisiti, avvisi, protezione, ca technologies, gdpr, autenticazione forte, automazione
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Desea ofrecer innovaciones, lanzar aplicaciones más rápido y aprovechar nuevas oportunidades, pero las infraestructuras y aplicaciones heredadas no se lo permiten. Cámbiese a una arquitectura moderna a través de la descomposición de aplicaciones monolíticas en microservicios ágiles, creados, gestionados y escalados de manera independiente. Su negocio podrá actuar más rápido y los desarrolladores estarán encantados con el acceso sencillo a las API, que les ofrece la libertad de centrarse en la experiencia de los clientes.
Tags : 
pequeños en tamaño, utilizan mensajería, delimitados por contextos, desarrollados de forma autónoma, descentralizados, ca technologies
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: LogMeIn     Published Date: Mar 12, 2018
La prolifération de nouveaux appareils, la montée des préoccupations de sécurité en raison de l’augmentation de la cybercriminalité, ainsi que le nombre d’utilisateurs avertis qui veulent un service clientèle accessible en permanence sont des phénomènes qui contribuent tous à accroître la complexité du paysage des services informatiques. Heureusement, il existe une solution pour dénouer le problème. Selon une nouvelle étude menée par IDG Research et sponsorisée par LogMeIn auprès de professionnels de l’informatique en Europe, les outils d’assistance informatique à distance constituent la solution idéale pour soulager les services d’assistance informatique sous-dimensionnés en personnel.
Tags : 
complexite, croissante, l'informatique, l'assistance, indispensable, europe
    
LogMeIn
Published By: LogMeIn EMEA     Published Date: Mar 22, 2018
La prolifération de nouveaux appareils, la montée des préoccupations de sécurité en raison de l’augmentation de la cybercriminalité, ainsi que le nombre d’utilisateurs avertis qui veulent un service clientèle accessible en permanence sont des phénomènes qui contribuent tous à accroître la complexité du paysage des services informatiques. Heureusement, il existe une solution pour dénouer le problème. Selon une nouvelle étude menée par IDG Research et sponsorisée par LogMeIn auprès de professionnels de l’informatique en Europe, les outils d’assistance informatique à distance constituent la solution idéale pour soulager les services d’assistance informatique sous-dimensionnés en personnel.
Tags : 
    
LogMeIn EMEA
Published By: Spredfast     Published Date: Nov 15, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media, social media support, social media customer care, client management software, customer support software, social media management tools, social media monitoring, social media training, social media marketing companies, social media analytics, social media marketing, social media software, social media management software
    
Spredfast
Published By: Location3     Published Date: Sep 04, 2018
Location3 client Mountain Mike’s Pizza and their franchisees face significant competitive challenges when advertising on Google, which ultimately requires the need to be both incredibly efficient with campaign setup and incredibly precise when managing bids and local budgets. A quick Google keyword search for “pizza near me” in Mountain Mike’s home state of California yields over 58,000,000 results (“pizza delivery” yields 56,000,000) and often features a predictable set of ad results from industry giants like Domino’s and Pizza Hut, among others. Suffice it to say that buying “pizza”-related terms in AdWords can get incredibly expensive, incredibly quickly, if a local franchisee’s budgets and bids are not managed with precision. When you combine that fact with limited location-level advertising budgets, our team atLocation3 was presented with a significant challenge in helping Mountain Mike’s Pizza generate increases in customer pizza orders while simultaneously ensuring that ad spen
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, mountain mike's pizza, paid search, us search awards, adwords, doubleclick
    
Location3
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have implemented the technology and processes to become more efficient at delivering client value. But choosing the right construction technology and making a compelling case for investment can be difficult. Download the eBook to demonstrate how construction software can be a significant driver of ROI across your business. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Amazon Web Services     Published Date: Nov 28, 2017
Les clients professionnels peuvent tirer parti des nombreux avantages qu'offre Amazon Web Services (AWS) pour parvenir à l'agilité commerciale, réaliser des économies de coûts et offrir une haute disponibilité, et ce en exécutant leurs environnements SAP sur le cloud AWS. La plupart des clients professionnels exécutent aujourd'hui leurs charges de travail de production sur AWS, y compris celles qui tournent sur des bases de données autres que SAP (Oracle, MS SQL, DB2) ou sur des bases de données SAP (SAP HANA, SAP ASE). Pour prendre en charge la demande d'instances à mémoire élevée, AWS a dévoilé la feuille de route des instances SAP HANA (8 To et 16 To en 2018) et vient de rendre disponibles les instances x1e de 4 To. Parmi les quelques exemples qui illustrent de quelle façon AWS a aidé les clients SAP à réduire les coûts et à améliorer les performances, ainsi que l'agilité, citons BP qui a diminué d'1/3 le coût de son infrastructure SAP, Zappos qui a réussi la migration vers SAP H
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Dec 01, 2017
Les informations suivantes doivent servir de ressources aux directeurs financiers qui dirigent ou assistent leur organisation tout au long de sa migration vers le cloud. Elles ont pour objet de présenter les motivations, les coûts, les risques et les avantages de l'adoption du cloud, et de soulever des questions importantes en matière d'effectifs et de technologie, qui s'avèrent essentielles à la réussite de cette adoption. Elles visent également à permettre de mener des analyses de rentabilité, en mettant en valeur des mesures et des indicateurs spécifiques aux environnements cloud, capables d'influencer les résultats. Les conseils fondamentaux qui sont fournis sont tirés de conversations et d'entretiens directs entre Amazon Web Services (AWS) et les directeurs financiers d'entreprises clientes, qui représentent un large éventail de secteurs d'activité.
Tags : 
planification, amazon, web, services, destine, aux, directeurs, financiers, guide
    
Amazon Web Services
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
The end of support date for Windows XP–April 8, 2014 is rapidly approaching, after which the potential for security vulnerabilities will dramatically increase. Companies with lots of Windows XP machines still in use need help upgrading in this compressed timeframe. Lenovo has an answer, as its Image Technology Center (ITC) services along with the Lenovo In-Place Migration (IPM) product can help internal IT staff quickly and successfully migrate from Windows XP to Windows 7 or Windows 8 with a minimum of disruption to users and the organization.
Tags : 
security, windows 8, windows xp, secure platform, enterprise computing, mdm, client virtualization software
    
Lenovo and Microsoft
Published By: Pure Storage     Published Date: Jul 18, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : 
le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
    
Pure Storage
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.