Skip to main content
 

proactive

Results 401 - 416 of 416Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
    
Akamai Technologies
Published By: Genesys     Published Date: Jul 13, 2018
When building artificial intelligence (AI) into your business strategy, it’s easy to become distracted by all the new technologies on the market—each one promising a better customer experience. Make decisions based on facts, not misconceptions. When you evaluate AI technologies, consider these facts: • Bots working with human agents enables a seamless customer journey • Automated self-service costs as little as 20 cents per interaction • A single platform makes it easier to deliver personalized, proactive and predictive experiences See how AI connects customer conversations in this new analyst guide, 2017 ContactBabel Inner Circle Guide to Self-Services.
Tags : 
    
Genesys
Published By: CA Technologies     Published Date: Aug 24, 2017
Pour gérer votre IT de manière professionnelle, vous avez besoin d’outils qui vous permettent de garantir la fiabilité de vos services de manière proactive, tout en renforçant votre agilité opérationnelle. Cela implique d’opter pour une nouvelle approche de la gestion de l’infrastructure IT et de sélectionner un fournisseur de solutions de gestion de l’infrastructure qui soit en mesure de répondre à vos nouvelles exigences IT et métier.
Tags : 
    
CA Technologies
Published By: Evariant     Published Date: Apr 09, 2018
If you're going to commit to providing the highest quality care to patients, improving the customer experience and providing proactive service that builds lifetime relationships with patients is a requirement. By creating a comprehensive 360 view of the caller, agents are armed with the right context and talking points to provide a highly personalized, more informed experiences on-the-fly. Watch this presentation to capitalize on every customer interaction to build deeper, more personalized relationships with their prospects and existing patients, effectively transforming the call center into a profit center. Watch the presentation now.
Tags : 
patient experience, call center, improved care continuum, access center, customer experience, patient journey
    
Evariant
Published By: Evariant     Published Date: Jul 02, 2018
When call center agents don’t have access to an EMR, consumer demographic, sociological and other data, nor an understanding of marketing campaigns, agents are inefficient, reactive and unable to personalize interactions with patients and consumers. The disjointed call center experience harms the health system’s ability to find, guide, and keep patients for life. The call center is often the first touch for many prospective healthcare customers, and Scripps Health recognized these challenges. They made the pivot from call center as cost center to strategic lynch pin in their patient experience strategy. Call center agents are now delivering a world-class patient experience as they provide physician referrals, take class registrations, and serve as a clearing house for general information . An added bonus of the shift is they can now integrate outbound calling into campaign efforts, and measure the full impact of marketing efforts and strengthen marketing’s ROI. Get your free copy of
Tags : 
call center, conversions, health, proactive
    
Evariant
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluecore     Published Date: Dec 10, 2018
Bluecore helped evo: Move from batch and blast to 1:1 email marketing Replace one-size-fits-all promotional emails with automated emails that feature targeted content and send based on customers taking certain actions or changes to products. Scale the email program and results without scaling the team Introduce 15 high performing email campaigns and expand the email program reach to support a growing business without adding new headcount. Add new value for shoppers and the marketing team Launch a series of emails that proactively notify customers about changes to products with which they’ve engaged, including price and stock changes, while simultaneously adding a new opportunity to capture email addresses.
Tags : 
    
Bluecore
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software APAC
Published By: DigiCert     Published Date: Jun 19, 2018
Regulatory compliance is more than a series of rules to adhere to, and getting it right could save you time and money. Historically, compliance has been regarded as a checklist of fixed requirements. But this reactive outlook risks being too short-sighted. It can lead to higher compliance costs, audit deficiencies, greater business downtime and an increased risk of data loss. Furthermore, it can lead to missed opportunities to achieve greater levels of operational effectiveness for your business. The only way to achieve a greater level of operational efficiency is to adopt a proactive strategy and stay ahead of the compliance curve.
Tags : 
    
DigiCert
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Dell EMC CloudIQ powered by Intel® Xeon® processors is like a fitness tracker for your storage environment, providing a single, simple, display to monitor and predict the health of your storage environment. CloudIQ makes it easy to track storage health, plan for future growth, report on historical trends, and proactively discover and remediate issues from any browser or mobile device.
Tags : 
    
Dell EMC Storage
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.