identify

Results 351 - 375 of 866Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 04, 2015
This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Docusign     Published Date: Feb 18, 2015
This White Paper reveals the EU e-signature law and the benefits of knowing about this law for the business.
Tags : 
esignature law, electronic signature technology laws, eu esignature law, docusign, identifying the signer, identification signer, authentication, identity management, password management, security policies
    
Docusign
Published By: GrowthIntel     Published Date: Feb 16, 2016
Many B2B companies still select their prospects using static government data such as SIC codes, NAIC codes, and historical financial info. This is like playing Battleships with your sales and marketing budget, lobbing outbound approaches blindly over the wall in the hope of hitting potential buyers. There has to be a better way. Imagine if you could identify every business that could buy from you, and rank them by their likelihood to convert. This ebook shows you how.
Tags : 
b2b, intel, business practices, decision management
    
GrowthIntel
Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
Published By: Genesys     Published Date: Jun 11, 2018
When you can anticipate customer needs, you can provide a customer experience that reduces frustration, increases satisfaction and creates better business results. Genesys Altocloud uses live analytics, powered by machine learning, to give you real-time insight into the customer experience. You can anticipate customer behavior, personalize journeys and use feedback to continuously tune your analytics to achieve desired business outcomes. Download the white paper and learn how to make better use of your analytics: • Automate responses that optimize the journey • identify and engage with customers before they contact you • Use predictive analytics and machine learning to drive outcomes
Tags : 
customer needs, customer experience, customer behavior, customer journey
    
Genesys
Published By: Genesys     Published Date: Jun 11, 2018
Don’t let your communications system hold you back. PBX systems once provided top-of-the-line business communications, but they weren’t designed to accommodate business growth and change. And cloud-based platforms have altered the landscape of business communications. Your PBX isn’t just an inconvenience, it could hurt your business. This eBook covers common problems associated with PBX systems as well as their impact on your business. Learn to identify signs of trouble in your business communications as well as key features to look for in a new system. Don’t let a fear of the unknown hold you back. Download the eBook and learn: • Key warning signs to look for in your PBX • The impact of maintaining an outdated system • How modern communication tools can benefit your business
Tags : 
pbx, cloud, business communications
    
Genesys
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: HiQ Labs     Published Date: Apr 18, 2017
Experts predict the number of M&A transactions will increase in 2017, but the nature of M&A is changing. The old ways of collecting data are getting to be too slow, too expensive, and too subjective. The ideal M&A transaction relies on accurate, actionable scientific insights into the target’s workforce to support the investigation, due diligence and integration aspects of M&A. hiQ Labs applies scientific rigor to publicly available data sets to forecast which employees are at risk of leaving, map the target workforce’s skills onto the buyer’s company, and identify which employees have the skills critical to the deal’s success, so M&A leaders get a faster, cheaper, and accurate solution based on science.
Tags : 
hiq labs, m&a, talent
    
HiQ Labs
Published By: Kronos     Published Date: May 30, 2018
In this article, learn the implications for companies when they don’t have reliable payroll processes that deliver accurate paychecks and what companies can do to rectify this issue: •Paycheck errors can negatively impact employee engagement •Nearly half of U.S. employees will look for a new job after having two problems with their paycheck •An automated payroll solution enables managers to review employee time daily and manage by exception, increasing payroll accuracy and saving manager and payroll staff time •Email alerts and a robust workflow can identify payroll issues before they become trends Download this informative article to learn more about the impact of payroll errors and the advantages of using an automated Kronos® workforce management solution to create perfect paychecks.
Tags : 
    
Kronos
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user.CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel® -like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools. Today, CA PPM provides financial managers with the ability to visualize, manage and take advantage of data like never before—all from inside the solution.
Tags : 
budgets, project, cash, flows, finance, project, management
    
CA Technologies EMEA
Published By: Kofax     Published Date: Aug 24, 2017
Are you ready for the digital revolution? Digital transformation is fundamentally reshaping the way insurers do business. From automated data integration, mobile implementation and analytics, digital transformation spans across your enterprise operations This white paper provides you with the roadmap you need to build a comprehensive enterprise-wide digital transformation plan that makes your insurance organization not only competitive, but differentiated. • Understand the forces behind digital disruption: customers, competitors, costs and compliance • Learn how to map, prioritize and identify opportunities for digital transformation • Leverage a process maturity model to advance your digital position
Tags : 
digital future, digital revolution, data integration, positioning
    
Kofax
Published By: Reputation.com     Published Date: Jun 29, 2018
HCAHPS is the barometer for understanding a patient’s hospital experience. But can you predict the outcome of your patient satisfaction surveys by reading online reviews from past and present patients? And more importantly, does improving your hospital’s online reputation improve HCAHPS scores? Yes. Reputation.com’s Data Science team, led by Brad Null, Ph.D, analyzed two years of HCAHPS hospital survey data from The Centers for Medicare and Medicaid Services, across more than 4,800 hospitals. The team reviewed the data alongside online reviews, ratings and rankings for those same hospitals, and made some significant discoveries: • Online reviews provide early warning of issues that may impact patient experience, giving hospitals the opportunity to identify and address those issues before patient satisfaction scores suffer. • By continually monitoring, managing, requesting and responding to patient reviews, a healthcare organization can address negative feedback that impacts HCAHPS resu
Tags : 
    
Reputation.com
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Docsend     Published Date: Apr 09, 2018
It’s no secret that content - from case studies to pitch decks - fuels the modern sales cycle. However, a vast majority of teams don't track prospect engagement with sales content, and if they do, it's unclear which metrics actually indicate success. This report, From Strategy to Execution: 6 Sales Content Benchmarks Every Business Needs, reveals 6 key benchmarks for how, when, and where prospects engage with sales content. In the report, you’ll find data-backed, actionable insights to help you: • Identify which sales content drives the sales cycle forward • Enable sellers to share the right content in their outreach • Build a more efficient, higher velocity sales pipeline
Tags : 
    
Docsend
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driver’s whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
    
Vehicle Tracking Solutions
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA
Published By: Artemis Health     Published Date: Jul 10, 2018
By looking at benefits data for self-insured employers, Artemis and its clients are finding wins, identifying trends, and positively impacting care.
Tags : 
    
Artemis Health
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
With high user expectations shifting faster than ever, the software landscape is evolving at a feverish pace to deliver higher–quality software—and testing must be able to keep up. CA has worked with Paul Gerrard, Principal, Gerrard Consulting, to identify some of the new challenges that the digital economy presents for testing, and the trends that have emerged to meet them. We cover some of these topics in this e–book.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Riverbed     Published Date: Feb 26, 2015
Use this Buyer’s Guide to identify the capabilities that will help you increase end-user satisfaction through a better quality of service.
Tags : 
performance management, quality service, network performance, application performance, vendor profile, network performance management
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
While powerful and beneficial, the Citrix XenApp environment can present new challenges to IT departments when troubleshooting application performance issues. Citrix acts as a proxy for backend applications, making it difficult to get end-toend visibility of transactions and to identify and troubleshoot end-user experience problems
Tags : 
troubleshooting, application performance issues, application management, enterprise application, application virtualization technology, application security
    
Riverbed
Published By: Riverbed     Published Date: Apr 24, 2015
Identify the right NPMD tools to detect application issues, identify root causes and perform capacity planning.
Tags : 
networking, api, applications, management, visualizing, best practices, monitoring, network management, network performance
    
Riverbed
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.