Skip to main content
 

proactive

Results 101 - 125 of 415Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Limeade     Published Date: Feb 02, 2017
Culture is the most important factor in any organization’s success or failure. If your culture doesn’t align with and support your strategy, your strategy will fail. Be a culture architect: Take 10 steps to proactively support your business strategy.
Tags : 
    
Limeade
Published By: Genesys     Published Date: Apr 25, 2013
Adopting a proactive approach to customer service has the potential to attract customers rather than losing them, to drive growth and innovation instead of hindering both.
Tags : 
customer service, cast study, change mangement, service, oriented, relationship management, customer interaction
    
Genesys
Published By: CEB     Published Date: Dec 03, 2014
As cost and productivity expectations persist, many functions are rethinking the way their work gets done to remain both efficient and innovative. But not all business partners may welcome these kinds of transformations. To stay progressive, the best companies enable employees to exercise greater influence over internal clients and alter the entrenched views their function.
Tags : 
procurement insights, operations insights, productivity expectations, proactive business, procurement organizations, productive supplier partnerships, supplier relationship management, procurement leaders, procurement executives, operations professionals, operations leaders, operations executives
    
CEB
Published By: MarkLogic     Published Date: Jun 19, 2017
Integrate your data silos to finally navigate the data maze. This comprehensive white paper addresses a key element in any GRC program: regulatory compliance. Download this paper to learn about the costs, current practices, and associated risks. We’ll also recommend a technologically-enabled approach and highlight its main business benefits for financial services, insurance, and energy companies. Overview Executive Summary Compliance Requirements A Recommended Approach Business Benefits Regulatory Compliance Solution Architecture Related Materials
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, energy, insurance
    
MarkLogic
Published By: Limeade     Published Date: Jun 08, 2015
Culture is the most important factor in any organization’s success or failure. If your culture doesn’t align with and support your strategy, your strategy will fail. Be a culture architect: Take 10 steps to proactively support your business strategy.
Tags : 
limeade, company culture, business strategy, roi
    
Limeade
Published By: DrFirst     Published Date: Mar 13, 2015
Sebasticook Valley Health’s Emergency Department found that when it came to obtaining medication history, DrFirst’s MedHx(SM) solution provided vast improvements over the built-in feed from their integrated electronic medical records system. The hospital did a side by side comparison of MedHx(SM) and their existing feed, and determined that MedHx(SM) provided superior results, which reduced staff time spent on medication reconciliation, improved patient safety and enabled the hospital pharmacy, as well as doctors and nurses, to be more proactive in pulling medication history upon patient admission.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical, records, reconciliation, safety, pharmacy, doctor, history, medication, ehr, providers, prescription, workflow, accuracy, electronic health records
    
DrFirst
Published By: FICO     Published Date: Nov 30, 2016
Unexpected failure or performance erosion of production equipment can significantly impact productivity, product quality and maintenance expenses within any manufacturing organization. It’s also difficult to get operations ‘back on track’ after these failures occur. The good news is that, via the Internet of Things, intelligent use of sensor data, machine learning and optimization can help companies take a proactive approach to predicting failures and re-optimizing processes around them.
Tags : 
iot, internet of things, manufacturing
    
FICO
Published By: ArborNetworks     Published Date: Sep 16, 2015
This paper examines the four stages of evolution as security organizations move from reactively responding to incidents to proactively identifying and hunting for threats.
Tags : 
    
ArborNetworks
Published By: Genesys     Published Date: Feb 21, 2018
In the ongoing evolution of the customer experience, organizations continue to rely on phone and email while introducing new customer engagement channels. With the channel mix rapidly changing, it has become more important than ever to accurately identify and proactively deploy the next-best channels for engaging customers today and tomorrow. Gartner Research has profiled 15 ways that organizations will engage customers over the next 20 years. This includes augmented reality, virtual reality and mixed reality immersive solutions which will be adopted by 20% of large enterprises by 2020. By learning which engagement channels will best meet your customers’ needs in the future and prioritizing those aligned with your business model, you can improve customer engagement and
Tags : 
gartner, customer engagement, customer experience, gartner research
    
Genesys
Published By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
Published By: Resonate     Published Date: May 30, 2018
A great product is no longer sufficient to guarantee strong sales and loyal customers. Today's empowered consumers not only reject corporate irresponsibility but also seek brands that proactively promote beliefs and values aligned with their own. Marketing leaders should read this report to learn how to identify and prioritize relevant values that resonate with their consumers, authentically integrate those values across the organization, and help build the evidence-based case to earn consumers' and stakeholders' trust.
Tags : 
    
Resonate
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: ServiceNow     Published Date: Sep 18, 2018
What is a performance based business? A performance-based business is an organization guided by data-driven decisions. It is proactive, self-aware, and highly competitive. Data isn’t siloed in a business analytics department. Instead, the right people have the right data at the right time and in the right context. The top 5 reasons to become a performance-based business: 1. Get better results. 2. Align your entire business. 3. Make data-driven decisions. 4. Manage change more effectively. 5. Spot trends faster. Discover how ServiceNow Performance Analytics could benefit your business by downloading this eBook.
Tags : 
performance, business, data, servicenow
    
ServiceNow
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
    
TIBCO Software APAC
Published By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
    
Iterable
Published By: Blue Coat     Published Date: Nov 23, 2015
It’s time for Proactive Incident Response: *Full logs in the SIEM, plus complete collection of packet data *Packet data indexed, easily searchable and correlated with threat intelligence and other data. Working with multiple sources of security data, threats are detected early.
Tags : 
    
Blue Coat
Published By: Sage     Published Date: Nov 28, 2017
"Your business may be competitive and successful today, but how will it perform in the future? It’s all too easy to be immersed in—perhaps even obsessed by—your daily operations. That’s why thinking about what your business and the market will look like one year, five years, even a decade from now needs to be a critical part of your thinking. It’s all about looking ahead, about being proactive. Marching confidently into the future requires a solid foundation for that empire you’re building. That’s why your planning efforts need to include a dedicated exploration into the types of innovative, evolving technologies that will accommodate the business of the future. This eGuide addresses the essential business principles that will always apply regardless of the stage your business is in. This resource helps you focus on the key points that should put you well on the way toward future-proofing your business."
Tags : 
    
Sage
Published By: Sage People     Published Date: May 18, 2018
In some kinds of more traditional businesses the finance department tends to swallow as much data as is thrown at it but only outputs small, measured and curated amounts of insights periodically: “Here’s revenue vs target in the last quarter”. These are undoubtedly essential for proper business management, But periodic reports also mean it can be too late for the business to respond. It’s like driving by looking only in the rear-view mirror. Looking at what’s behind isn’t going to let you spot a sudden bend in the road! Essentially, the highly competitive and evolved business environment of today requires businesses to have proactive, indicative business metrics. Combined with more traditional metrics, these mean businesses have invaluable and complete insight in order to evaluate performance. Proactive, indicative business metrics are found across most successful businesses–and especially amongst C-suite employees. These people know that the benefits are proven. Analytics-driven execu
Tags : 
    
Sage People
Published By: Diligent     Published Date: Jul 10, 2017
William Hill made a faster-than-expected transition to using Diligent Boards due to rapid adoption by the board members and proactive support from both William Hill’s Secretariat team and Diligent. In addition, the company found one unexpected benefit –Diligent Boards is a very helpful tool when new directors join the board. Use of Diligent Boards has spread thanks to positive word of mouth from William Hill board members to other companies on whose boards William Hill board members also serve.
Tags : 
diligence board, portal, meeting information, providers, directors, document management, william hill
    
Diligent
Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations
    
Qualys
Published By: BMC ESM     Published Date: Aug 20, 2009
There is a natural progression from reactive to proactive, and ultimately predictive technology, and this progression corresponds to the maturity level of your IT organization and the tools you leverage.
Tags : 
bmc, predictive technology, tools, it tools, itil, predictive intelligence, dynamic thresholding
    
BMC ESM
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud
    
LifeLock
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.