australia

Results 1 - 25 of 72Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia
Published By: Bronto     Published Date: Feb 01, 2018
We surveyed ecommerce executives from the US, the UK, Canada, Australia and the Netherlands to learn more about their best practices. We wanted to know more about their top priorities, how they’re responding to consumer needs and how they’re optimizing their digital and mobile strategies, among other insights. What are the obstacles they’re facing, and which technologies do they think are key for future success? What You’ll Learn: • The channels and tools they’re focusing on for driving sales and profits. • How brick-and-mortar and ecommerce can complement one another. • Their take on mobile strategy and optimization by device. • The technologies they would invest in if time and money were no issue.
Tags : 
ecommerce, consumer needs, retail
    
Bronto
Published By: Bronto     Published Date: Feb 01, 2018
We surveyed thousands of consumers in the US, the UK, Australia, Canada and the Netherlands to see how they use mobile technology to interact with retailers. This report details how browsing, product research, comparison shopping and buying have all been transformed by mobile technology. What you'll learn: • Who’s buying via mobile. • How having children in the household affects mobile shopping. • Which customers are most likely to use their phones while shopping in-store.
Tags : 
mobile shopping, mobile, consumer behavior, retail
    
Bronto
Published By: Bronto     Published Date: Jul 19, 2017
The Internet has opened up a shopper's paradise where you can find and buy anything right from the living room. With a few simple key strokes, a consumer can choose products and services from merchants around the globe - from that authentic British trench coat to an Australian boomerang to wine straight from the California coast. But with the gates to cross-country commerce opened wide, have consumers abandoned their local retailers for international merchants abroad? To answer this question, we commissioned a consumer study, in the US and Australia and Census wide in the UK. We hope this original research helps you better understand the opportunities and challenges of cross-country trade.
Tags : 
ecommerce, loyalty program, customer incentive, global sales, customer loyalty, commerce, cross border shopping, global ecommerce
    
Bronto
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs
    
QTS
Published By: Cherwell Software     Published Date: Apr 07, 2016
Curves® and Jenny Craig® operate 7,000 Curves clubs and franchises globally and 400 Jenny Craig locations supported by IT service desks in California, Texas, and Australia. The two organizations combined to form Curves Jenny Craig in November 2013. Outdated systems, known internally as “the black hole,” plagued Jenny Craig with inefficient processes and created a lack of accountability. For example, records could not be categorized or prioritized properly, tracked by date or owner, and they could be intentionally hidden in an ambiguous status. Without visibility, Jenny Craig had no way to quantify the impact of their customer service. Mary Carter, manager of IT service, summed it up, “We had no reporting prior Cherwell Service Management.” Curves was in even worse shape as they logged tickets in an Excel® spreadsheet.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
BOTS ARE PERSISTENT – IT’S A NUMBERS GAME.
Tags : 
    
Akamai Technologies Australia
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The school has a reputation for innovation and makes extensive use of technology to educate its students and to prepare them for the technologies which help shape the world of both work and higher education.
Tags : 
technology innovation, technology, technology for education, byod, education
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Download this paper now to learn how you can prevent such an attack and protect your business
Tags : 
prevent cyber-attacks, cyber-attacks, security application, security
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
    
Kaspersky Lab Australia and New Zealand
Published By: Oracle     Published Date: Aug 09, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm, human resources
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Citrix Systems     Published Date: Feb 23, 2011
Citrix solution brief explains the key considerations and employee, IT and organizational benefits derived from a BYO program.
Tags : 
citrix systems australia, byo program, employee productivity, business process, bring your own computer, employee productivity, corporate data ownership, desktop virtualization
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 23, 2011
Citrix solution brief explains the technical functionality of Citrix solutions that enable a successful BYO program.
Tags : 
citrix systems australia, byo program, employee productivity, windows desktop, bring your own computer, employee productivity, data security, mobile computing
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 23, 2011
By using Citrix ReceiverT, organisations are able to deliver virtualized applications and desktops to their employees' mobile devices.
Tags : 
citrix systems australia, customer profile, apple ipad, citrix receiver, employee productivity, mobile devices, virtual desktop
    
Citrix Systems
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper will explore the impacts of fatigue that extend beyond personal safety and outline effective remedies for this widespread concern.
Tags : 
workforce software, fatigue, personal safety
    
Workforce Software
Published By: WFS Australia     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : 
time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
    
WFS Australia
Published By: WFS Australia     Published Date: Dec 02, 2015
Fatigue management delivers business benefits in terms of your overall workforce management strategy, whether it is an expected function of the business or not. Mitigating fatigue risk can have a dramatic impact on your workforce and your bottom line. Proactively managing employee fatigue is a hallmark of leading businesses, as it demonstrates concern for your employees, customers and the larger community.
Tags : 
employee fatigue, productivity, workforce management, productivity, fatigue management, human resources
    
WFS Australia
Published By: WFS Australia     Published Date: Dec 02, 2015
Moving beyond an administrative mindset and optimising the flow of people behind the processes can bring about significant cost savings, as well as open new doors for revenue creation. As organisations look to prioritise IT spending, workforce management should be seen as a strategic imperative, for a number of compelling reasons.
Tags : 
workforce management, scheduling, administration, cost savings, workforce management strategy, human resources
    
WFS Australia
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
" How Millennials and Baby Boomers are Shaping the Today and Tomorrow of Retail The Power and The Money - Get latest trends on global consumer shopping behavior across online, mobile and in-store channels - Read what differentiates millennials from baby boomers - Learn how to give every individual the experience they are looking for so nobody is left behind - Surveyed: 13,250 consumers, 12 countries - Australia, Brazil, China, France, Germany, Italy, India, Japan, Mexico, Russia, UK & USA "
Tags : 
    
Oracle Commerce Cloud
Start   Previous   1 2 3    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.