esp

Results 1 - 25 of 2782Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
    
3D Systems
Published By: Instructure     Published Date: May 30, 2019
The Future of Work: 10 Essentials for Winning Employee Development Your go-to guide for thriving in the changing face of work Employee development looks a lot different today than it did just a few years ago. This ebook details 10 trends that are crucial for keeping up with the ever-changing future of work. The modern workforce is a place where baby boomers, Gen X, millennials and now Gen Z all share the same Nespresso machine. That’s four distinct generations with different views, expectations and priorities. Companies will have to adopt new methods for just about everything—from recruitment and benefits to employee development and career planning. While there are several key differences between each generation in the modern workforce, how companies should treat them can be summarised in one word: individually. This ebook is designed to help HR and L&D professionals who want to turn their organisation into a learning environment well-equipped for the workplace of tomorrow, do ex
Tags : 
    
Instructure
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
Published By: Gigamon     Published Date: Jun 10, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall
Published By: Infinidat EMEA     Published Date: May 15, 2019
2017 no fue un año fácil para los CIO/CISO, y 2018 tampoco da muestras de serlo. Con tantas brechas en los datos acaecidas tan solo en 2017 y capaces de acabar con la carrera de cualquiera, (Equifax, Uber, Yahoo son algunos ejemplos), y los requisitos normativos reforzados a nivel mundial, los CIO/ CISO tienen la responsabilidad corporativa de replantearse su enfoque sobre la seguridad de los datos.
Tags : 
    
Infinidat EMEA
Published By: Beqom     Published Date: Jun 19, 2019
Les lec?ons ignore?es qui vous aideront a? re?ussir votre passage au nume?rique Les responsables RH et commerciaux doivent rationaliser le processus de re?mune?ration tout en attirant et en gardant les meilleurs e?le?ments, en soutenant la strate?gie commerciale et en assurant la conformite? re?glementaire. Remplissez le formulaire pour télécharger instantanément notre livre blanc gratuit et pour connaître les cle?s de la réussite de votre transition nume?rique de la re?mune?ration globale.
Tags : 
    
Beqom
Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform— • Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity • Minimizing the footprint of the systems to save space, cost and power consumption • Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Deluxe     Published Date: Jun 10, 2019
Small business lending continues to be a growth industry, with multiple approaches and diverse players offering solutions to help small businesses manage their demand for financing. The industry continues to evolve, with lenders bringing new technology, innovation, and products to the market. Yet despite intense competition, small businesses are still underserved for financing. There is still tremendous upside growth for lenders and marketers who want to compete in this space.
Tags : 
    
Deluxe
Published By: Anaplan     Published Date: Mar 12, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: KPMG     Published Date: Jun 06, 2019
In a world where digital is mainstream, the IT function lives or dies on the way it delivers technology services, responds to issues and manages expectations. Are you ready for the future? Download this report to discover: • what role IT has to play in developing a future-ready, connected enterprise • why fundamental changes to the IT operating model are necessary • six key areas where IT must deliver to avoid getting left behind.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
In future, people with IT skills will no longer work only within the IT function. Instead, they’ll be part of an ecosystem of technology talent across the enterprise. How should CIOs respond to this change? Read this briefing to find out: • what the changing status of technology means for the IT workforce • how CIOs can encourage employees to be IT enablers rather than IT ‘doers’ • why we need to rethink IT as a technology talent ecosystem • why IT should no longer be the gatekeeper to technology – and what it needs to become instead.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Companies that use digital technologies to drive agility and responsiveness, and enhance the customer experience achieve higher revenue growth than their competitors. Find out how. Read this briefing to discover: • how digital leaders are different from the average organisation • key characteristics of digital leaders • how the CIO can become the agent for digital change.
Tags : 
    
KPMG
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.