identify

Results 151 - 175 of 925Sort Results By: Published Date | Title | Company Name
Published By: JBoss Developer     Published Date: Oct 21, 2016
Markets constantly test organizations with shifting customer expectations and competitors seeking to provide better value at a lower cost. This tension is the catalyst that continually pushes organizations to search for ways to improve their services, improve the speed which they deliver value to their customers, enable employees to get more done with less administrative overhead, and most importantly, to constantly grow by generating more revenue. This is the basis of BPM, to be able to identify and capture processes in an organization to create repeatable, measureable and consistent execution of goals to drive their business forward.
Tags : 
open source, stp, brms, kpi, management
    
JBoss Developer
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
    
IBM APAC
Published By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : 
microservice, management, business transactions, hybrid cloud, docker, environment
    
AppDynamics
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
    
CA Mainframe
Published By: Success Factors     Published Date: Jul 08, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: Oracle     Published Date: Oct 30, 2017
"Time is money. If you are not able to quickly make the right moves based on timely, accurate financial information, then you will lose your position in the marketplace to those companies who can. Download this guide to see how to simplify and streamline financial processes in order to identify underperforming lines of business, perform accurate cash flow projects, support expansion into new markets, and much more. "
Tags : 
simplify, streamline, financial processes, cash flow, expansion
    
Oracle
Published By: NetApp     Published Date: Nov 20, 2014
Learn how storage environments can help address high-availability needs and identify critical features necessary for businesses to meet the bar for six 9s availability. You’ll also see how two customers have leveraged NetApp storage solutions to meet their stringent requirements for uptime as they manage dynamic, high-growth businesses.
Tags : 
enterprise storage, storage solutions, requirements, high-growth business
    
NetApp
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm
    
Dyn
Published By: Monetate     Published Date: Sep 30, 2014
Personalization. It’s about the hottest topic out there for digital marketers. If you’re going to do it, though, you need to know with which customers you should start your personalization efforts. Which means you need to know which of your customers are most valuable—not always an easy task. This white paper will teach you how to identify your most valuable customers, create a personalized experience for them, optimize that experience, and begin the process again with another customer segment. Also included are three real-life examples of companies that found their most valuable customers, focused on personalizing their relationships with them, and drove additional business, increased customer loyalty and improved customer retention.
Tags : 
personalization, customer retention, customer loyalty, digital marketers
    
Monetate
Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell
Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: LifeLock     Published Date: Mar 02, 2015
Find out why LifeLock identify theft protection is the right choice for your business with this quick guide to our technology, leadership team, marketing strategy and more.
Tags : 
    
LifeLock
Published By: SAP     Published Date: Jun 04, 2015
Read this eBook to learn how SuccessFactors offers a full suite of talent solutions to help you: • Attract, engage, select, and hire the right talent • Get your new hires up to speed in record time • Provide continuous performance management • Reward and retain your top talent • Identify and anticipate talent gaps • Provide learning anywhere, any time • Get content as a service • Harness the power of collaboration
Tags : 
    
SAP
Published By: SAP     Published Date: Jun 12, 2015
Read this white paper to learn how organizations are taking action on succession management to avoid nightmare situations.
Tags : 
    
SAP
Published By: Dell EMC     Published Date: Aug 22, 2017
Identifying the benefits, costs, and risks associated with an Isilon implementation, Forrester interviewed several customers with experience using Isilon. Dell EMC Isilon is a scale-out NAS platform that enables organizations to store, manage, and analyze unstructured data. Isilon clusters are composed of different node types that can scale up to 68 petabytes (PB) in a single cluster while maintaining management simplicity. Isilon clusters can also scale to edge locations and the cloud
Tags : 
    
Dell EMC
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Read this white paper to learn how organizations are taking action on succession management to avoid nightmare situations.
Tags : 
    
SuccessFactors, an SAP Company
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Read this eBook to learn how SuccessFactors offers a full suite of talent solutions to help you: • Attract, engage, select, and hire the right talent • Get your new hires up to speed in record time • Provide continuous performance management • Reward and retain your top talent • Identify and anticipate talent gaps • Provide learning anywhere, any time • Get content as a service • Harness the power of collaboration
Tags : 
    
SuccessFactors, an SAP Company
Published By: Datamyx     Published Date: Aug 11, 2016
Here’s what you need to know about prescreening with Deluxe Marketing Services. With prescreening, you’ll be able to identify consumers who match your credit qualifications AND are likely interested in your loan product -- so you can reach out with your best offer. No more wasting campaign dollars on people who are neither qualified nor interested in a loan right now.
Tags : 
deluxe, prescreening, lending, credit, loan
    
Datamyx
Published By: Okta     Published Date: May 09, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : 
    
Okta
Published By: Brocade     Published Date: May 02, 2016
By 2020, the Software-Defined Data Center will be a requirement for 75% of the Global 2000’ according to Gartner. But is the SDDC right for you? The key to success is to plan big but start small. This Gartner report will help you understand the value of SDDC, identify the best use cases, and mitigate deployment risks.
Tags : 
    
Brocade
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.