reach

Results 301 - 325 of 1512Sort Results By: Published Date | Title | Company Name
Published By: Sprinklr     Published Date: Nov 22, 2016
In this social listening whitepaper, you'll learn that listening technology provides brands with the power to reach consumers via the digital platforms where they research, make, and discuss their purchasing decisions.
Tags : 
social listening, value, consumers, purchasing decisions, listening technology, listening, tools, whitepaper
    
Sprinklr
Published By: Sprinklr     Published Date: Nov 22, 2016
A quick fact sheet that details the reach and audience of major messaging apps to help companies know which platform would be best suited to their audience.
Tags : 
messaging app research, messaging app data, social media data, social media intelligence, snapchat data, snapchat statistics, wechat data, wechat statistics, whatsapp statistics, whatsapp data, line statistics, line data
    
Sprinklr
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of mega breaches continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
This years Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 including the now-infamous hack of the Democratic National Committee (DNC) are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: How CrowdStrikes Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR The gaps in security processes and planning that your organization can address now to stop the next breach The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers arent implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether its speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institutes 2017 Cost of Data Breach Study says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EUs General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Oracle     Published Date: Jul 12, 2017
If anyone remained skeptical about the clouds utility and staying poweras a delivery mechanism for everything from infrastructure as a service (IaaS) to platform as a service (PaaS), software as a service (SaaS), and more, a quick look at recent statistics would surely change their mind. Indeed, with the cloud software market reaching US$48.8 billion in 2014 and anticipated to grow to US$112.8 billion by 2019, its clear that cloud computing is not just the way of the future, its also the way of the present.
Tags : 
erp, cloud, iaas, paas, saas, cloud computing
    
Oracle
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
This survey of senior managers and directors was conducted in four regions North America, Europe, the Middle East and Africa (EMEA), Central and South America, and Asia- Pacific with the aim of discovering attitudes towards and plans for the adoption of cloudbased supply chain management (SCM) solutions. We focused on three key areas: 1. The criticality of supply chain to their business 2. How to reach their business objectives through supply chain processes 3. The propensity to use the supply chain cloud and reasons for adopting/not adopting
Tags : 
cloud, supply chain management, scm, cloud computing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
This survey of senior managers and directors was conducted in four regions North America, Europe, the Middle East and Africa (EMEA), Central and South America, and Asia-Pacific with the aim of discovering attitudes towards and plans for the adoption of cloud based supply chain management (SCM) solutions. We focused on three key areas: 1. The criticality of supply chain to their business 2. How to reach their business objectives through supply chain processes 3. The propensity to use the supply chain cloud and reasons for adopting/not adopting
Tags : 
cloud, scm, supply chain management, cloud computing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain or kill-chain of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
In the beginning, the marketing landscape was easier to navigate, with just a few select channels to reach your customers through. However, as it constantly evolves, this landscape is quickly becoming a fragmented world. In the frantic scramble to become king of the hill, marketers grab hold of as many channels as they can, but often without an overall strategy to pull together one uniform message. The result? They spread themselves thinly across multiple channels, which results in shattered messaging.
Tags : 
customer, journeys, marketing, channels
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
As humans, we are driven to find ways of making an increasingly complex world simpler. For both customer and marketing leaders - technology helps us to do that. For marketers particularly in Financial Services, the focus shifts from a supply-led, to a demand-led economy; the trust economy, where customer demands continue to diversify and the fastest to deliver value wins.
Tags : 
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Wholly relevant and personalized customer service is no longer an optional preference, so much as an inevitable reality. Through the right data management technology, marketers can pave the way for their customers to reach the right ticket for their chosen journey, through the channels they prefer, in a way which means something to them in that particular moment. Airlines dont have to make use of beacon technology and IoT to begin uplifting their outreach, but should choose a solution which is ready as soon as they are, to plug into, embrace and deliver actions with a shifting landscape of consumer touchpoints.
Tags : 
customer, marketers, technology, management
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isnt working. Perhaps youre struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isnt working. Perhaps youre struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of A Short Primer of GDPR Essentials to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothlys super secret formulas? Did the hackers act alone or scarier yet In this light hearted graphic novel Through the Looking Glass Table, discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can help anyone IT managers and sophisticated SOC analysts better understand and respond to incidents, breaches, phishing attempts, insider threats and more. did they have help from the inside?
Tags : 
    
Splunk
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japans largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someones life depends on it. Without IT that wouldnt be possible. But Mutohs IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovos hyperconverged infrastructure that helped the company achieve: The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japans largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someones life depends on it. Without IT that wouldnt be possible. But Mutohs IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovos hyperconverged infrastructure that helped the company achieve: The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japans largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someones life depends on it. Without IT that wouldnt be possible. But Mutohs IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovos hyperconverged infrastructure that helped the company achieve: The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japans largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someones life depends on it. Without IT that wouldnt be possible. But Mutohs IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovos hyperconverged infrastructure that helped the company achieve: The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Dont lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, youll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. Its time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.