Skip to main content
 

practitioners

Results 51 - 75 of 86Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: Mar 24, 2015
New research findings, new technologies, and the evermore urgent needs for speed and cost-efficiency are converging to drive a revolution in medicine. Supporting this convergence are high-speed secure telecommunications networks, enabling unprecedented teamwork among institutions, researchers, practitioners and patients to create a new paradigm: telemedicine, the exchange of medical information via electronic communications among dispersed facilities and patients to improve patient health. Download this white paper to learn more about telemedicine.
Tags : 
bandwith, ethernet communications, medicine, telemedicine, telecommunications, healthcare technology
    
Comcast Business
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense
    
ThreatTrack Security
Published By: Oracle     Published Date: Dec 21, 2016
This research note is designed to support the near and mid-term infrastructure plans for Oracle infrastructure practitioners and DBAs, and better understand the fit of products like ODA relative to other appliances in Oracle's portfolio.
Tags : 
    
Oracle
Published By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management, detection, protection
    
Cyphort
Published By: LogRhythm     Published Date: Apr 04, 2017
The third-annual Cyberthreat Defense Report pursues this same objective: to inform the IT security community not so much about what the bad guys are up to, but rather about how their peers globally are currently defending against threats and the changes they expect to make going forward. Based on a rigorous survey of IT security decision makers and practitioners – across not only North America and Europe, but for the first time, in Asia Pacific and Latin America as well – the Cyberthreat Defense Report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions.
Tags : 
    
LogRhythm
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Mar 28, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, smarter workforce, talent management, talent analytics
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting
    
IBM
Published By: Workday     Published Date: Jun 05, 2017
This report, seen through the eyes of senior practitioners, shows how the convergence between HR and IT is radically transforming the future of business and the structure of organisations.
Tags : 
workday, workforce management, human resource technology, hr technology, employee performance, finance
    
Workday
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: SAS     Published Date: Jun 06, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management
    
SAS
Published By: SAS     Published Date: Mar 14, 2014
This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
    
SAS
Published By: IBM     Published Date: Sep 30, 2016
Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches
    
IBM
Published By: SAS     Published Date: Jun 05, 2017
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally.
Tags : 
    
SAS
Published By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Oracle     Published Date: Mar 18, 2014
Much as a journalist is expected to report on the “who, what, when,” etc. when filing their story, professional business-to-business (B2B) sales reps are more likely to open doors, nurture opportunities, and close deals when they know more about their prospect or customer. Sales Intelligence, as a broad category of tools and services within the Sales Effectiveness space, represents a significant opportunity for all varieties of sales-oriented job roles to better understand their buyer both before and during the traditional — and non-traditional — sales cycle. This Research Brief summarizes initial Aberdeen research findings based on recent sales intelligence data collected from 206 survey respondents, and provides specific guidance regarding best practices and technologies that sales leaders and sales operations practitioners are well-advised to adopt.
Tags : 
oracle, b2b, sales intelligence, sales effectiveness, traditional sales cycle, non traditional sales cycle, sales operations, sales research
    
Oracle
Published By: AdRoll     Published Date: Jul 11, 2017
This is Econsultancy’s first State of Marketing Attribution report, published in association with AdRoll. The research is based on an online survey of practitioners in the UK, France and Germany, aiming to establish current adoption levels and types of strategies organisations are using. The study evaluates tools and processes employed as well as the potential barriers to effective use of the capability.
Tags : 
marketing attribution, adroll, marketing strategies, efficiency
    
AdRoll
Published By: AdRoll     Published Date: Feb 21, 2018
This is Econsultancy’s second State of Marketing Attribution report, published in association with AdRoll and based on an online survey of 987 practitioners in Europe, North America and Asia-Pacific. We expanded on last year’s report, which focused solely on Europe, and made the report a global comparison. This report reviews the current adoption levels of marketing attribution, the confidence in its usage and the effectiveness of companies’ attribution methods.
Tags : 
marketing attribution, attribution modeling, roi, attribution
    
AdRoll
Published By: Saba Software     Published Date: Aug 15, 2016
Six times a year, the HR Daily Advisor® research team conducts detailed research into pressing contemporary human resources (HR) challenges to highlight best practices and common policies and procedures. We access our exclusive database of more than 250,000 active HR practitioners to find out how HR managers are handling challenges in the real world. Dear HR Practitioner, You know that a Learning Management System (LMS) can bring value to your organization, but how do you make the business case to those outside of HR? This is one of the most common hurdles that we hear at Halogen Software from our customers, so we thought it would make for a very interesting survey topic. Like you, we wanted to know how organizations are making their decisions around HR technology for learning, including: • What role HR plays in the selection of the LMS, • Which LMS features are most important, • How organizations calculate the ROI of their LMS, and • Whether learning content is created in-house
Tags : 
    
Saba Software
Published By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : 
oms, online marketing summit, online marketing, emarketing, strategic marketing
    
Online Marketing Summit
Published By: SBE     Published Date: Nov 21, 2008
In today’s business environment, marketing practitioners must attempt to align their marketing efforts with management’s strategic vision. After all, a greater return on investment (ROI) translates into improved marketing effectiveness and increased revenue, profi t, and market share for the same amount of marketing spend.
Tags : 
archway, roi, archanalytics, marketing operations management, business intelligence
    
SBE
Published By: BambooHR - HR Software     Published Date: Jan 25, 2011
Administrative demands leave HR practitioners with time for little more than keeping up with growing workloads. A voice at the strategy table requires efficient HR information systems to and create real value in the HR function.
Tags : 
bamboohr, spreadsheets, excel, administrative demands, workloads, human resources, talent management, hr software
    
BambooHR - HR Software
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.