Skip to main content
 

time app

Results 351 - 375 of 1023Sort Results By: Published Date | Title | Company Name
Published By: Datastax     Published Date: Jan 07, 2019
Digital disruptors are giving customers the information they want, when, where, and how they want it, resulting in a fundamental shift in customer expectations and how enterprises deliver value. As enterprises move towards adopting these modern applications and achieving data autonomy, the data layer and cloud infrastructure they run on can make a huge impact. In this eBook, we’ll take a look at why DataStax and Azure combine to make the ideal data layer for contextual, always on, real-time, distributed, and scalable applications.
Tags : 
    
Datastax
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
Analysts struggle to incorporate new sources of data into their analysis because they rely on Microsoft Excel or other tools that were not designed for data blending. Deleting columns, parsing data, and writing complicated formulas to clean and combine data every time it changes is not an efficient way for today’s analysts to spend their time. Download The Definitive Guide to Data Blending and: Understand how analysts are empowered through data blending Learn how to automate time-consuming, manual data preparation tasks Gain deeper business insights in hours, not the weeks typical of traditional approaches
Tags : 
    
Alteryx, Inc.
Published By: Druva     Published Date: Sep 27, 2017
A massive migration is taking place fueled by strategic digital transformation initiatives focusing on increasing workload mobility while delivering scalable applications that reduce downtime and increase user productivity. Learn why organizations are now looking to the cloud as it represents an appealing option for managing VMware enterprise environments.
Tags : 
vmware, digital transformation, workload mobility
    
Druva
Published By: Fiserv     Published Date: Mar 02, 2018
Does your company still rely on a time-consuming and error-prone manual approach to reconciliation? Does it consolidate multiple data sources from disparate systems to close the books? Find out how one of the top 10 multi-line insurers automated the reconciliation process for over 3,000 accounts, resulting in fewer errors and quicker close times. Plus, the insurer now has visibility into all reconciliation items rather than reviewing 300 different Excel reconciliation documents!
Tags : 
manual reconciliation, automated reconciliation for insurers, automated reconciliation, automated insurance reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
At a time when workers use more apps than ever to do their jobs – and from more locations and devices than ever – traditional IAM is simply not sufficient, says David Meyer, Vice President of Product at OneLogin. Cloud-Based IAM is what organizations truly need.
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Red Hat     Published Date: Jan 02, 2018
When Aviva plc, a multinational insurance provider group, acquired Friends Provident International (FPI), it needed to replace FPI’s costly proprietary imaging and bond management workflow system. With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster.
Tags : 
    
Red Hat
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Thrill customers and empower employees with omni-channel, socially-infused digital experiences to drive better business outcomes IBM Customer Experience Suite features rich, integrated capabilities for managing web content, rich-media assets, real-time social communications, robust customer self-service capabilities, business analytics and mobile device delivery IBM Employee Experience Suite enables employees to easily find and share relevant information across multiple platforms, diverse geographies with multiple languages, and within the context of business applications
Tags : 
digital experience, ibm, software
    
Group M_IBM Q1'18
Published By: TIBCO Software     Published Date: Aug 13, 2018
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled application
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
Analyst firms Gartner, Inc. and Forrester are projecting accelerated data virtualization adoption for both first-time and expanded deployments. What are the uses cases for this technology? At its Data and Analytics Summit in London in March 2018, Gartner answered this question by identifying 13 data virtualization use cases. This paper explores each of these use cases by: Identifying key requirements Showing how you can apply TIBCO® Data Virtualization to address these needs Listing the benefits you can expect when implementing TIBCO Data Virtualization for the use case
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
    
TIBCO Software
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Jun 25, 2018
Recognizing the shift to a subscription business model required real-time customer support, Autodesk turned to IBM technology to enhance its customer experience. Using Watson Assistant, Autodesk developed a virtual agent to interact with customers, applying natural language processing (NLP) and deep learning techniques to recognize and extract the intent, context and meaning behind inquiries. Quickly resolving easy customer concerns, Watson Assistant is supporting 100,000 conversations per month, with response times 99% faster than before and leading to a 10-point increase in customer satisfaction levels for Autodesk. Find out how Watson Assistant can accelerate your customer support experience. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall
    
Palo Alto Networks
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow
    
K2
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: Amazon Web Services     Published Date: Jan 23, 2018
The notion of digitizing your business has become a matter of “when,” rather than “if.” For many, migrating critical workloads to the cloud is a key part of this transformation. When deciding on a cloud provider, however, IT executives are under pressure to find a solution that enables reduced costs, greater agility, and above all, the ability to innovate core business processes. At the heart of many businesses embarking on this journey is their SAP environment. But since SAP workloads represent some of the most critical and deeply integrated business applications, IT executives are required to look for ways to execute this migration in the most timely and reliable manner. Organizations migrating to the cloud cannot risk application downtime or productivity loss. Provided by: AWS & Intel
Tags : 
sap, optimization, migration, aws, network
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Apr 16, 2018
SAP and Amazon Web Services (AWS) have jointly developed a cloud-migration test program, Fast Amazon SAP Transformation (FAST), that helps you address time- and cost-related uncertainties when migrating HANA to the AWS cloud. This analyst report from Ovum explores how FAST (a four-step testing process) drastically reduces uncertainties about the time and costs involved in your HANA cloud migration. Download the report now and you’ll discover how FAST can help you: -Quickly quantify costs, risks, and time for migrating SAP ERP applications to the AWS Cloud. -Run your mission-critical applications faster and more reliably Migrate your SAP HANA database to the cloud in only a few days with minimal infrastructure cost Read the Report
Tags : 
    
Amazon Web Services
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Urban Airship     Published Date: Oct 18, 2017
Push notifications for mobile and web that boost customer engagement & retention. Our data study of 63 million new app users shows that when brands send high value push notifications more frequently (sometimes more than one a day!) users are more likely to engage and keep their app. So what kinds of push notifications should you be sending? Download this eBook for 50+ examples you can use to increase the frequency of your notifications (web or app) — and reap the bottom line benefits.
Tags : 
    
Urban Airship
Published By: Sage     Published Date: Mar 07, 2018
There comes a time in a company’s growth when applications that used to work well can no longer keep up with complexities of scale. This white paper describes 3 warning signs that indicate your disconnected financial applications are holding you back. Also, learn how migrating to a unified cloud solution can improve financial forecasts, enable you to act on more accurate information, increase productivity, and more. Don’t make this mistake. In this eBook, we explain the three warning signs you must watch out for if you want to know when it’s time to move your important customer and financial information to the cloud. Then we’ll show you exactly what managing your most important information with a cloud-based accounting solution means for you and your business. Download it today.
Tags : 
    
Sage
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.