Skip to main content
 

phi

Results 251 - 275 of 1737Sort Results By: Published Date | Title | Company Name
Published By: Prophix     Published Date: Jun 03, 2016
Prophix financial consolidation is the springboard to strategic financial analysis and better business decision making.
Tags : 
best practices, financial consolidation, financial analysis, prophix
    
Prophix
Published By: Prophix     Published Date: Jun 03, 2016
The paradigm for budgeting has changed. Watch this demo of budgeting with Prophix to learn how to improve organizational agility, gain efficiencies within your department and realize the business value that comes with a budget that is accurate, auditable and collaborative.
Tags : 
best practices, budgeting, prophix, organizational agility
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Watch how Prophix empowers you with monitoring reports and analytics to support a continuous process that involves the input of employees from across the organization. With Prophix, you can evaluate your corporate performance from both high-level and granular views. And by ensuring that you keep an eye on the alignment of business goals and the company’s progress, you will enjoy a valuable tool for facilitating informed decision making.
Tags : 
prophix, best practices, productivity, business analysis
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
With Prophix you can produce rolling forecasts, multi-year forecasts, daily forecasts and driver-based forecasts. With a centralized application, organizing fragmented data from multiple sources and change assumptions easily and create a multitude of scenarios.
Tags : 
prophix, forecasts, application, database management
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Prophix gives you a clear picture of all your operational costs and connects them with key factors that are driving your revenues. That increased line-of-sight is made possible because Prophix tracks and monitors all day-to-day operational planning activities. Improving operational outcomes for the short-term and providing insights into your future operations
Tags : 
prophix, best practices, database management, productivity, business analysis
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Integrated financial planning with Prophix breaks down the silos and fosters collaboration, giving you a more complete picture of your organization to make more informed and accurate decisions for long-term strategic planning.
Tags : 
financial planning, prophix, best practices, strategic planning
    
Prophix
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed® Cascade® Pilot and Cascade Shark combine sophisticated, end-to-end monitoring with high-speed,high-fidelity packet capture and analysis to deliver comprehensive network performance monitoring and analysis. By continuously recording the packets traversing the network, rich troubleshooting details are always available, accelerating problem isolation and resolution times, and increasing productivity. Download this insightful solution brief to learn more.
Tags : 
network performance, riverbed cascade pilot, cascade shark, it infrastructure
    
Riverbed
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
A high level overview and introduction to the VCE VxRail Appliance.
Tags : 
vce, vxrail appliance, hyper converged, intro to vxrail
    
EMC Converged Platforms
Published By: Socialbakers     Published Date: Jul 22, 2015
In this exclusive Socialbakers report, we look at how National Geographic uses competitive analytics and content optimization strategies to keep up with audiences and remain one of the most engaging social brands in the world.
Tags : 
social media, social media best practices, content optimization, engagement, social media engagement, social, social brands, social metrics, content
    
Socialbakers
Published By: Okta     Published Date: Mar 14, 2016
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Evariant     Published Date: Sep 07, 2016
Marketers face a unique challenge to allocate resources across a variety of tactics to target key audiences that need their product or service – with limited information on what combination of products or services will have the optimum impact, which target audience members are ideal fits, and what allocations will provide the best return on investment to the organization. Healthcare has its own myriad of challenges, including many local, regional, and national options for consumers, service line variations, and disparate demographics. The good news is that there is an emerging understanding of digital and multichannel marketing, and ample opportunity to define best practices, systematically calculate marketing effectiveness and return on marketing investment (ROMI), and use technology and data to create great business outcomes.
Tags : 
evariant, multi-channel marketing, hospital, patient engagement, digital marketing
    
Evariant
Published By: Evariant     Published Date: Apr 03, 2017
Health systems must capitalize on every patient and consumer interaction—from fielding the first inquiry to actively supporting proactive health, ongoing care, and recovery—to achieve a “trusted provider” status in the eyes of consumers and patients. Yet, the majority of call centers today do not deliver the robust, personalized support capabilities today’s patients and consumers expect, and the current healthcare marketing environment demands. Download your free copy of this eBook to learn why sophisticated health systems are transforming yesterday’s call center into tomorrow’s engagement center.
Tags : 
patient engagement, call center, improved care continum
    
Evariant
Published By: Netsuite     Published Date: Dec 08, 2016
Read this Frost & Sullivan survey report of 1,500 senior executives across a range of industries in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US) to understand what’s driving rapid industry transformation from digitalization, globalization to cloud computing. Learn how cloud computing has emerged not just as a cause of change but increasingly as a necessary response providing the flexibility and adaptability that’s key to survival.
Tags : 
cloud computing, erp, digitalization
    
Netsuite
Published By: HPE APAC     Published Date: Feb 23, 2017
Read this infographic to learn how your datacenter needs Hyperconvergence.
Tags : 
data center, hyperconvergence, storage, infrastructure, hyperconverged infrastructure
    
HPE APAC
Published By: HPE APAC     Published Date: Feb 24, 2017
View this infographic to get the facts about HPE Storage
Tags : 
hpe, storage, magic quadrant, backup, enterprise storage
    
HPE APAC
Published By: Oracle (Hospitality)     Published Date: Mar 28, 2017
Hotels and resorts with function space may well have an opportunity to boost their overall property revenue, given the escalating demand for function space and the fact that many of them have already maximized the value of their guest rooms through sophisticated revenue management capabilities. Success generally starts with a next-generation technology solution that can empower sales and catering personnel. Success also requires having in place the right organizational resources, business processes and performance metrics.
Tags : 
hotels, resorts, function, space, oracle, metrics
    
Oracle (Hospitality)
Published By: Q2 eBanking     Published Date: Oct 24, 2017
Banks and credit unions can prevent fraudsters and other cybercriminals from gaining an upper hand on them by using more sophisticated protection. This protection is found in five layers of proactive security defense. Q2’s paper, Multilayer Security— Because a moat is not enough, discusses these essential layers to keeping account holders secure.
Tags : 
    
Q2 eBanking
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s markets move with incredible speed. You’re bombarded with new competitive threats every day— new companies, new products, and new technologies. At the same time, opportunities are opening up like never before, all demanding sophisticated evaluations and quick decisions. To varying degrees, your competitors may already be adopting agile, and their resulting ability to sense, create and adapt to change may soon leave you at a competitive disadvantage. Your organization can’t afford to be in reactionary mode any longer. You need the ability to anticipate change—and to embrace and capitalize on it quickly and with confidence.
Tags : 
organization, customer focused approach, technology, enterprise, integrations, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 20, 2015
How did firewalls develop to provide the strong, deep security and sophisticated capabilities that they offer us today? It’s a long story that took place over a relatively short period of time, and most likely you were part of it.
Tags : 
juniper, firewall, packet, filter, security
    
Juniper Networks
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.