intent

Results 26 - 50 of 124Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Cisco     Published Date: Oct 08, 2018
Cisco DNA takes a software-delivered approach to automating and assuring services across your campus, WAN, and branch networks. Based on an open and extensible platform, DNA allows you to build value on the network, so you can streamline operations and facilitate IT and business innovation.
Tags : 
networking, intent-based networking, gartner, wan, network, innovation, digital, digital network
    
Cisco
Published By: NetApp     Published Date: Nov 27, 2017
Join data protection experts from Forrester Research, NetApp and AWS and find out how to secure your Microsoft Office 365 business-critical data from accidental deletion, corruption, or malicious intent.
Tags : 
    
NetApp
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: Lucidworks     Published Date: Aug 24, 2016
Download this eBook to learn how to optimize enterprise search and increase search relevancy using content, context, and the crowd to build better search applications.
Tags : 
search engine optimization, seo, search relevancy, search applications, search intention, ecommerce search
    
Lucidworks
Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel
Published By: HP Inc.     Published Date: Jun 15, 2018
Intent on providing options for customers, Forecast 3D offers nine different production methods. But HP Multi Jet Fusion technology is the leader of the pack. Learn how Forecast 3D has deployed HP Jet Fusion 3D printers to change the way its customers are manufacturing. Download the Case Study
Tags : 
    
HP Inc.
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Resource     Published Date: Dec 04, 2018
What’s a common characteristic of the best talent? They all have jobs. In today’s marketplace, to get the best talent you have to convince them your opportunity is better than what they currently have. The good news: it can be done - and you can win consistently with a deliberate outbound process. The bad news: it requires an intentional approach which is challenging without the right tools and data. Your success depends on your ability to build a repeatable process to identify and recruit a steady volume of high quality applicants. The way to accelerate and scale your outbound process is to benchmark and refine it regularly using data. Below we’ll walk through the steps to building a data-driven recruiting process, based on.. you guessed it.. data.
Tags : 
    
Resource
Published By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : 
ventana, report, iot, operational intelligence, organizations
    
Teradata
Published By: Concur     Published Date: Dec 06, 2012
A straightforward guide that covers what expenses fraud is, what it costs the UK, whether you should be concerned, and what you can do about it.
Tags : 
expenses, fraud, criminal, intentional
    
Concur
Published By: Kofax     Published Date: Oct 20, 2011
In this report, we look at the drivers for ECM investment, the adoption of collaborative technologies, use of outsourcing, user priorities, views of the future as regards cloud and open source, and spend intentions for the next 12 months.
Tags : 
kofax, business, finance, ecm, investment, report, technology
    
Kofax
Published By: athenahealth     Published Date: Jun 08, 2015
In this whitepaper, we argue that traditional models for estimating HCIT costs are inadequate and overlook several business-critical variables. Our intention is not to provide a comprehensive TCO model, but to expose and examine the operational considerations that most TCO models fail to recognize or account for, and to equip executives to ask the right questions about the cost of delivering clinical and financial results stemming from technology procurement
Tags : 
hcit, heath care it, ownership, patient experience, tco
    
athenahealth
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: Red Hat     Published Date: Jan 02, 2018
Once upon a time, several generations ago (in technology years), IT departments were internal departments, focused on maintaining infrastructure and services within the company. Some companies may have had external-facing services, particularly web services, but this was still generally a narrow and restricted area. IT wasn’t a revenue-generating or strategic department; it was a supporting environment viewed as a cost center. One of the outcomes of an infrastructure-focused environment is that developers lost a sense of what their code was doing. Release cycles were long, and changes were slow. A developer would work on something and throw the code into testing or operations, and it would be released months later. Because of that long lead time, engineers lost the joy of being a developer—of creating something and seeing it work in real life. One of the great, powerful changes with digital transformation and related cultural and technology changes like DevOps is that it reintroduce
Tags : 
    
Red Hat
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
It's demanding times for businesses. Facing risks as diverse as extreme weather and cyber-attacks, ?rms are focusing more intently on business continuity plans. At the same time, the digital revolution is changing lifestyles, disrupting business models and acting as a catalyst for change. Energy itself is undergoing a transformation, as generation moves towards renewables and decentralization, while technological advances present new opportunities. Energy now has the potential to deliver competitive advantage, to enhance sustainability and resilience, and to power innovative business models. But equally, the range of new options available is making the management of energy more complex. Read this thought leadership paper to find out how energy can drive your business strategy.
Tags : 
business, strategy, energy, efficiency, performance
    
Centrica Business Solutions
Published By: MindTouch     Published Date: Mar 08, 2019
Better with knowledge management. To operate effectively, chatbots need to be able to quickly match user intent to relevant information. This means querying the available knowledge sources for answers. As it turns out, the better organizations structure, organize, and publish this information, the better their chatbots will be. This puts next-gen knowledge management solutions square in the middle of the chatbot conversation.
Tags : 
    
MindTouch
Published By: MindTouch     Published Date: Mar 08, 2019
Chatbots are hungry and knowledge management is the secret sauce. Chatbots are all the rage. They help customers find information and answers. They help contact centers automate tasks and create considerable efficiency gains. How, then, do organizations ensure their chatbots consistently deliver A+ experiences? The answer is knowledge management. Without the availability of rich, relevant content, chatbots have very little to work with during customer interactions. They won’t be able to accurately match user intent with the right information. And that’s no good for the customer. How knowledge management changes all that is the topic of our latest whitepaper.
Tags : 
    
MindTouch
Published By: IBM     Published Date: Jun 25, 2018
Recognizing the shift to a subscription business model required real-time customer support, Autodesk turned to IBM technology to enhance its customer experience. Using Watson Assistant, Autodesk developed a virtual agent to interact with customers, applying natural language processing (NLP) and deep learning techniques to recognize and extract the intent, context and meaning behind inquiries. Quickly resolving easy customer concerns, Watson Assistant is supporting 100,000 conversations per month, with response times 99% faster than before and leading to a 10-point increase in customer satisfaction levels for Autodesk. Find out how Watson Assistant can accelerate your customer support experience. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: CEB     Published Date: Nov 21, 2013
How do you know if your organization has the talent it needs to execute on its strategy? Is your organization’s talent ready to perform in the new work environment? Are your talent development programs focused on the right people?
Tags : 
ceb, big data, big data intent, global workforce, organisational talent, business objectives, productivity, innovation
    
CEB
Published By: Adobe     Published Date: Nov 02, 2018
t any moment, anywhere in the world, on any kind of device, a prospect or customer is raising their hand and saying, “I’m your best opportunity. Don’t ignore me.” They’re telling you that by every action they’ve taken and every interaction you’ve had up to that point. You can consider each bit of data you’ve collected across their journey a meaningful expression of intent. And with that, you will know how to give them an experience that’s above their expectations and beyond their imagination. When you can do that, it’s magical. The flow feels seamless and natural to your customer. These in-the-moment, justfor- them experiences move with them from one touchpoint to another and keep them coming back for more. And as the experiences get better and better, so does the likelihood that they’ll take the action you want. Because every customer wants an amazing experience, and every brand wants to deliver one. It thrills you as a marketer and helps you achieve your business goals. Amazing means
Tags : 
    
Adobe
Published By: Singularity University     Published Date: Oct 20, 2017
As the rate of business change continues to accelerate, organizations need new strategies to enable exponential growth and impact. Watch Patrick van der Pijl, one of the world’s leading experts on business model innovation, share how he has helped leaders at hundreds of organizations to become more strategic and intentional about their business models.
Tags : 
    
Singularity University
Published By: Insight Software     Published Date: May 22, 2018
My Final Farewell - A Tribute To Excel Before we part ways, I must, must, must make sure you have this whole piece straight. As a former accountant myself, I truly do understand the reliance on spreadsheets. It is not my intention to remove spreadsheets entirely from your organization. Excel certainly has a number of excellent qualities that have served us well for years. My true intention with this elaborate work of entertainment is to inform. The rest is really up to you. For more information or just for fun, visit gohubble.com
Tags : 
organization, spreadsheets, hubble, excel
    
Insight Software
Published By: Resonate     Published Date: Jan 24, 2018
Brands have never been so fragile. The way we find, consume, and share information has changed dramatically in the past 10 years. Traditional customers have been replaced by a more demanding, less loyal breed of customer, and the explosion of channels makes attracting and retaining this new consumer even harder. Digitally savvy buyers are more likely to base their purchasing decisions on relevant customer experiences than on a logo. Even as these device-hopping consumers’ behaviors and preferences change at a dizzying pace, there's still an expectation for a consistent, meaningful experience — but if it's not optimal their perception of value drops and they disengage. So how can brands serve and delight smart customers across different channels and devices? Marketers must move beyond insights based on consumer demographics, transactional behavior, browsing habits, and intent.
Tags : 
customer strategy, marketing strategy, consumer intelligence software
    
Resonate
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.