Skip to main content
 

proactive

Results 51 - 75 of 417Sort Results By: Published Date | Title | Company Name
Published By: WFS Australia     Published Date: Dec 02, 2015
Fatigue management delivers business benefits in terms of your overall workforce management strategy, whether it is an expected function of the business or not. Mitigating fatigue risk can have a dramatic impact on your workforce and your bottom line. Proactively managing employee fatigue is a hallmark of leading businesses, as it demonstrates concern for your employees, customers and the larger community.
Tags : 
employee fatigue, productivity, workforce management, productivity, fatigue management
    
WFS Australia
Published By: Evariant     Published Date: Apr 03, 2017
Health systems must capitalize on every patient and consumer interaction—from fielding the first inquiry to actively supporting proactive health, ongoing care, and recovery—to achieve a “trusted provider” status in the eyes of consumers and patients. Yet, the majority of call centers today do not deliver the robust, personalized support capabilities today’s patients and consumers expect, and the current healthcare marketing environment demands. Download your free copy of this eBook to learn why sophisticated health systems are transforming yesterday’s call center into tomorrow’s engagement center.
Tags : 
patient engagement, call center, improved care continum
    
Evariant
Published By: Q2 eBanking     Published Date: Oct 24, 2017
Banks and credit unions can prevent fraudsters and other cybercriminals from gaining an upper hand on them by using more sophisticated protection. This protection is found in five layers of proactive security defense. Q2’s paper, Multilayer Security— Because a moat is not enough, discusses these essential layers to keeping account holders secure.
Tags : 
    
Q2 eBanking
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: IBM APAC     Published Date: Aug 25, 2017
Consumerization of IT and the Internet of Things (IoT) are revolutionizing how people live. Users are increasingly becoming accustomed to instant gratification when using technology in their personal lives, whether for gaming, shopping or managing their daily activities. And they want the same kind of immediate service when they go to work. To address this expectation, IT support needs to adapt, evolve and even revolutionize itself or become outdated. In short, IT support must reinvent itself into a friendly, proactive service that is tied directly to a business’ profitability.
Tags : 
cognitive it support, transactions, system of engagement, soa, omnichannel support, ibm
    
IBM APAC
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: IBM     Published Date: Sep 22, 2011
A structured and proactive approach to managing costs and increasing efficiency.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity
    
IBM
Published By: ServiceNow     Published Date: Feb 24, 2017
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
ServiceNow
Published By: CA Technologies     Published Date: Aug 21, 2017
In today’s application economy, market success is increasingly being defined by an organization’s ability to deliver multi-channel applications that provide an exceptional and differentiated customer experience. To deliver the service levels required, IT teams need to move to establish proactive IT monitoring approaches. This white paper offers an overview of the key requirements that must be met for IT teams to establish effective proactive monitoring capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Pour gérer votre IT de manière professionnelle, vous avez besoin d’outils qui vous permettent de garantir la fiabilité de vos services de manière proactive, tout en renforçant votre agilité opérationnelle. Cela implique d’opter pour une nouvelle approche de la gestion de l’infrastructure IT et de sélectionner un fournisseur de solutions de gestion de l’infrastructure qui soit en mesure de répondre à vos nouvelles exigences IT et métier.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Dans l’économie des applications, la réussite d’une entreprise est de plus en plus conditionnée par sa capacité à livrer des applications multicanal offrant une expérience client différenciée et exceptionnelle. Pour garantir les niveaux de service que cela implique, les équipes IT doivent passer à des approches de supervision IT proactives. Ce livre blanc dresse un aperçu des exigences clés que ces équipes doivent remplir afin de mettre en place des fonctionnalités de supervision proactive efficaces.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Apr 14, 2016
Discover what it takes to deliver truly proactive care to customers and find out how active customer experience management can deliver significant business benefits in the form of cost savings, reduced churn, and increased revenue.
Tags : 
ibm, telecom, customer experience, proactive customer care, csp, communication service providers
    
IBM
Published By: IBM     Published Date: Oct 26, 2016
In this paper, you’ll explore how business analytics can form the foundation for a proactive threat management strategy. - See examples of how different types of organizations are applying analytics. - Learn practical steps you can take to combat threat and fraud in your own organization.
Tags : 
ibm, analytics, predictive analytics, risk management
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, shows that certain firms are able to consistently demonstrate success in reducing breaches across all major forms of cyber-attack. Read this report to learn more.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
    
CA Mainframe
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Red Hat     Published Date: Nov 30, 2015
A step-by-step guide for adopting software-defined storage as part of a practical, proactive strategy for managing enterprise data. Flexibility is inherent in this technology, and now more than ever, a flexible IT architecture might be the key to facing the once unthinkable challenges of big data.
Tags : 
software-defined storage, enterprise data, it architecture, big data
    
Red Hat
Published By: Genesys     Published Date: May 10, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications.
Tags : 
genesys, frost & sullivan, communication, conversation, proactive, outbound engagement, customer experience
    
Genesys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.