business activity

Results 1 - 25 of 44Sort Results By: Published Date | Title | Company Name
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Dell - NVIDIA     Published Date: Nov 04, 2019
Artificial intelligence (AI), machine learning (ML), and deep learning (DL) technologies are expected to permeate day-to-day business as well as customer activity. Industries such as healthcare (advanced diagnosis and treatment), transportation (advanced driver assistance systems and autonomous vehicles), and life sciences (rare disease treatment research) are some of the early adopters of AI. The goal for any organization adopting AI/ML/DL is to deliver meaningful insights and predictions that can significantly improve products, processes, or services across industries and use cases. Today, as AI becomes mainstream, many organizations find themselves in the initial proof-of-concept (POC) stage; only a few are in full production. IDC's 2019 Artificial Intelligence Global Adoption Trends and Strategies Survey found that 18% of organizations had AI models in production, 16% were in the POC stage, and 15% were experimenting with AI.
Tags : 
    
Dell - NVIDIA
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Dell Software     Published Date: Oct 03, 2013
Web 2.0 allowed businesses to increase the speed and efficiency of their web sites. Unfortunately, they also limited businesses’ ability to track user activity to the extent HTML allowed. Download Four Ways to Modernize your Application Performance Monitoring Strategy for Web 2.0 and AJAX today.
Tags : 
dell, foglight, apm, best practices, application performance management, technology, user experience
    
Dell Software
Published By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
This analysis profiles products that can accelerate the shift toward business-user-oriented, visual, interactive data preparation.
Tags : 
gartner, analysis, data visualization, business tools, best practices, interactivity, vendor functionality
    
Waterline Data & Research Partners
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Don’t let a point of sale outage hurt sales and ruin the customer experience. Internet downtime can rack up thousands of dollars in lost revenue. A negative user experience can hurt your business and ultimately cause customers to move to a competitor. A business continuity solution can help provide additional bandwidth to handle peak activity and support temporary retail activity.
Tags : 
    
U.S. Cellular
Published By: Trustpilot     Published Date: Apr 30, 2018
Having reviews is essential, but it’s only the first step Today, the winners in business are not always the ones with the lowest prices or the biggest range of products. In fact, the winners are not even always the biggest brands. The winners are trusted companies who offer an exceptional customer experience again and again. Simply, the winners are those who are listening to their customers. We all know we need reviews on our website, we know visitors to our website want to see reviews to help them make their buying decision. But that is just the beginning. Recognize the full potential that reviews have and you’ll see an improvement in the performance of all your marketing activity.
Tags : 
marketing, ecommerce, conversion strategies, seo, customer reviews, user generated content
    
Trustpilot
Published By: MessageLabs     Published Date: Sep 25, 2008
In the underground digital economy, thousands of criminals conduct business in excess of $100 billion. In this whitepaper you’ll learn more about this highly specialized marketplace, and how it generates powerful tools to steal victims’ identities. You’ll also see why MessageLabs unique proprietary technology helps to disrupt this activity.
Tags : 
messagelabs, malware, trojans, spyware, viruses, dot.com, fraud, botnet, spammers
    
MessageLabs
Published By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : 
firearms collection software, firearms inventory software, firearms management system, firearms tracking software
    
Epicor
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: SAP Inc.     Published Date: Jul 28, 2009
Decision-making is at the core of all business activity, as executives set strategy and manage operations by weighing a vast array of factors to arrive at the desired balance of risk and reward. The enormous growth of companies' size and operations in recent years-particularly across borders-is making this process increasingly complex. It is cause for alarm, then, that executives themselves perceive the quality of decision-making at their companies as mixed at best.
Tags : 
sap, business intelligence, dashboards, analytics, decision-making
    
SAP Inc.
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Oracle     Published Date: Apr 03, 2012
Read this white paper for an explanation of how business process management melds with complex event processing. The combination nets intelligent business processes that react to changing business conditions in real time.
Tags : 
bpm, business process management, cep, complex event processing, oracle, business activity monitoring, bam, sla, slas, eda
    
Oracle
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn 6 simple steps for successful what-if or activity-based budgeting and how an effective ABC model will allow your managers to have much greater spending control over their cost structure.
Tags : 
forecasting resource demands, activity based budgeting, productivity, technology, customer relationship, small business, finance
    
Adaptive Planning
Published By: F5 Networks Inc     Published Date: Jul 21, 2014
Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about the essential principles driving web application acceleration technologies today.
Tags : 
web app, acceleration, implementation, data, performance
    
F5 Networks Inc
Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn 3 critical legacy application evaluation activities to ensure cloud migration success. Activity #1: Determine if there is a cost justification Activity #2: Conduct a cloud readiness study to better understand the business and technical factors Activity #3: Conduct a pre- and post-migration study to understand how the app will behave in the cloud
Tags : 
legacy application evaluation, cloud migration, cloud readiness, mobile
    
Riverbed
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
    
Intralinks
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Find out how you can convert your pains into profit. Learn how Microsoft Customer Relationship Management (CRM) can help you develop profitable customer relationships. Microsoft CRM uses lead and opportunity management, incident management and a searchable knowledgebase. CRM also makes use of reporting tools for accurate forecasting, measurement of business activity, and employee performance.
Tags : 
sales, sales software, sales funnel, forecasting, analytics, business activity monitoring, microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
In this webcast, we discuss how companies excel when they empower their people to drive the business forward. While strategies, organization, motivation, and leadership all set the stage for business success, you also have to give your people the right tools, information, and opportunities to see results—because ultimately success is determined by your people. Learn why we call a business that fosters a winning environment a "people-ready business."
Tags : 
microsoft, business activity, business intelligence, business analytics, analytics, analytical, business strategy
    
Microsoft Dynamics
Published By: Skillsoft     Published Date: Apr 26, 2011
This paper seeks to uncover the fundamental requirements for a successful social learning program.
Tags : 
social learning, skillsoft, eigth truths, ingenius, learning re-imagined blog, business value, social platform, informal learning activity, social networking
    
Skillsoft
Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : 
progress software, idc, complex event processing, apama, transport, logistics, kpi, greening, consolidation, lifecycle, business activity monitoring, bam, business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.