Skip to main content
 

data organization

Results 26 - 50 of 1551Sort Results By: Published Date | Title | Company Name
Published By: Quovant     Published Date: Oct 01, 2019
Even with the greatest level of talent on your in-house legal team, you will at some point, need the services of external counsel. When an organization rates its outside law firms, selecting just the right data might be a challenge. Business leaders may not be lawyers, so it may be necessary to rely on the self-assessment of firms to determine the “health” of their programs. But does it need to be that subjective? Hard data is an essential tool when it comes to performance evaluation. There are specific metrics organizations can use to evaluate law firm performance. While it may not be “all about the money,” these key metrics can provide insight into how your panel handles its work and the value of the results you receive.
Tags : 
    
Quovant
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Innovation requires many ingredients: a great idea, creativity, persistence, the right data, and technology. Governments around the world are taking advantage of the cloud to reduce cost and transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government face budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency, all while reducing costs. This whitepaper provides guidelines that governments can use to break down innovation barriers and achieve a digital transformation that helps them engage and serve citizens.
Tags : 
    
Amazon Web Services APAC
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Adobe     Published Date: Sep 23, 2019
Why data-driven businesses stand out from the crowd. Why Should the Target Audience Care? Enterprises need to become more data-driven by using more mature analytics tools to stand out from the crowd Supporting Concepts Smart, effective customer analytics tools helps organizations reap the rewards of increased customer satisfaction and brand loyalty. Neglecting advances in customer analytics technology could seriously impact a company's ability to compete in the future marketplace. Where do your customers and prospects sit on the customer analyticsmaturity scale? Are they leaders or are they laggards? Read "Customer Analytics: The 20 Attributes that Lead to Business Success" for insights into: • the key drivers needed within an organisation that help grow customer analytics maturity • why companies using paid analytics solutions experience more tangible benefits than those using free analytics • how to distinguish customer analytics leaders from laggards
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Data is a company’s most valuable asset. Just look at Forbes’ World’s Most Value Brands list. No longer is a company’s worth evaluated by its tangible assets — data has changed all of that. Every business today relies on data. The ability to filter through volumes of data to capture true insights is critical to gaining a competitive advantage. Companies aspiring to deliver the best possible customer experiences must be able to unify different types of information, including behavioral, transactional , and operational data
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
This guide provides tips on how to filter through targeted solution marketing to make an informed, objective assessments when selecting the best commerce solution for you. Key points include: - Finding a platform that is flexible, agile, scalable. - The benefits of employing a single platform for all commerce use cases. - Leveraging customer data for commerce strategies - Employing an ecosystem of support. - Focusing on long term value over the initial costs. Every organization is at a different point in their ability to deliver frictionless shopping experiences that customers demand. Follow these guidelines to position your business for strategic growth.
Tags : 
    
Adobe
Published By: Marketo     Published Date: Sep 03, 2019
Across all industries, marketing increasingly plays a critical role in company growth. It is the marketer’s responsibility to help their organization retain, nurture, and increase their customer base—not an easy task. Having the right technology and skill set is essential to provide measurable ROI and deliver on the bottom line. Everything starts with the customer, and the tech needed to assist them on their buyer journey. By harnessing a well-considered MarTech stack, marketers can bring order to the overwhelming volumes of data they collect from online and offline interactions with prospective and existing customers. Better yet, this technology enables you to make those insights actionable, meaning you can make informed decisions. Download this ebook for eight practical steps your organization can take to put together a high-performance MarTech stack.
Tags : 
    
Marketo
Published By: Virgin HealthMiles     Published Date: Jul 25, 2012
Virgin HealthMiles reached out to a variety of companies to get this data-rich snapshot of the goals, programs and investments American organizations are making in health and wellness.
Tags : 
    
Virgin HealthMiles
Published By: Gigaom     Published Date: Oct 15, 2019
Data pipelines are a reality for most organizations. While we work hard to bring compute to the data, to virtualize and to federate, sometimes data has to move to an optimized platform. While schema-on-read has its advantages for exploratory analytics, pipeline-driven schema-on-write is a reality for production data warehouses, data lakes and other BI repositories. But data pipelines can be operationally brittle, and automation approaches to date have led to a generation of unsophisticated code and triggers whose management and maintenance, especially at-scale, is no easier than the manually-crafted stuff. But it doesn’t have to be that way. With advances in machine learning and the industry’s decades of experience with pipeline development and orchestration, we can take pipeline automation into the realm of intelligent systems. The implications are significant, leading to data-driven agility while eliminating denial of data pipelines’ utility and necessity. To learn more, join us fo
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
    
Gigaom
Published By: AWS     Published Date: Oct 01, 2019
Informatica is a leader in Enterprise Cloud Data Management, providing solutions that help organizations optimize, transform, and analyze their data. Informatica’s Intelligent Data Platform is built on a microservices architecture, helping organizations ensure their data is trusted, secure, governed, accessible, timely, relevant, and actionable on-premises or on the cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: Zynapse     Published Date: Jun 16, 2010
Data Governance has emerged as the point of convergence for people, technology and process in order to manage the crucial data (information) of an enterprise. This is a vital link in the overall ongoing data management process for it maintains the quality of data and makes it available to a wide range of decision making hierarchy across an organization
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
Published By: Avetta     Published Date: Aug 28, 2018
11 ways to identify the best supplier verification partner for your organization Most of us know that operating a thorough and sustainable supplier qualification program is critical to reducing risk. But how many can say they feel confident in their process? From the ongoing collection and verification of data, to the oft-required cooperation between departments; building and maintaining a great program can be challenging. Avetta suggests there are 11 requirements of a world-class supplier qualification program. See how your organization measures up when you download the Ultimate Supplier Qualification Guide.
Tags : 
    
Avetta
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.