professional

Results 951 - 975 of 1280Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 17, 2016
As digital transformation accelerates, the opportunity to engage customers digitally has never been greater but so has the threat of not delivering great customer experiences. In order for customer insights professionals to compete, the use of customer understanding to optimize experiences at scale must be at the heart of all digital transformation initiatives. Digital intelligence provides a vision and approach that captures a holistic view of the customer in order to optimize digital interactions, engagements, and experiences. During his talk James McCormick will describe the vision and need for digital intelligence; the approach needed to make it a strategic initiative, and ultimately, how it will provide a competitive advantage.
Tags : 
ibm, customer experience, commerce, customer experience analytics, data insights, digital intelligence, digital interaction, engagement, customer insights, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 12, 2016
As digital transformation accelerates, the opportunity to engage customers digitally has never been greater but so has the threat of not delivering great customer experiences. In order for customer insights professionals to compete, the use of customer understanding to optimize experiences at scale must be at the heart of all digital transformation initiatives. Digital intelligence provides a vision and approach that captures a holistic view of the customer in order to optimize digital interactions, engagements, and experiences. During his talk James McCormick will describe the vision and need for digital intelligence; the approach needed to make it a strategic initiative, and ultimately, how it will provide a competitive advantage.
Tags : 
ibm, commerce, customer analytics, digital intelligence, customer experience, knowledge management, enterprise applications
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia, corporate data, networking, mobile computing, mobile data systems, wireless communications, wireless hardware, wireless security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forresters 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : 
ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity, compliance, firewalls, hacker detection, vulnerability management
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution, security, it management
    
IBM
Published By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 14, 2015
If you havent looked at enterprise search technology in a while, its time to give it another look. This report details their findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals select the right solution to grace their enterprise with the power of knowledge on demand.
Tags : 
ibm, forrester, knowledge discovery solutions, big data, enterprise, search technology, application development, networking, security, software development, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security, intelligence, cloud, data center
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud, security, knowledge management, enterprise applications
    
IBM
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC
Published By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that todays cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
With the deadline for GDPR compliance looming in May 2018, its a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
With the deadline for GDPR compliance looming in May 2018, its a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit for buyers seeking to centrally reduce and manage data risks across disparate database environments.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Published By: OneSource     Published Date: Jan 07, 2010
Technology and improved access to information is making selling both harder, and easier. Our increased "connectedness" offers opportunities for the innovative, insightful, and motivated sales professional to shine. In this white paper we'll talk about what lies beyond Sales 2.0: how to marry the "best of the fundamentals" with sales enablement and social media.
Tags : 
one source, sales 2.0, social media, enablement, sales tools, crm, selling power, engagement
    
OneSource
Published By: Gomez Marketing     Published Date: May 23, 2011
In the study, Forrester broke down the process of calculating the ROI of brands' mobile initiatives into four key steps-identifying benefits, estimating the value of the benefits, calculating costs and building a model-to help justify the resources they need for mobile without getting lost in the details.
Tags : 
compuware, gomez, mobile roi, julie a. ask, forrester, mobile return on investment, mobile marketing, mobile advertising, mobile commerce, tco, consumer data
    
Gomez Marketing
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.