Skip to main content
 

infor

Results 51 - 75 of 4134Sort Results By: Published Date | Title | Company Name
Published By: join.me     Published Date: Jan 29, 2014
Built on the results of an annual survey of Internet shoppers worldwide, the 2013 Live Chat Effectiveness report outlines Internet shopper communication and purchasing behavior and preferences. The report includes findings specific to live chat technology, as well as other engagement channels, such as phone, email and social media. In this year’s report, we explore how Internet shoppers use these various channels to inform purchase decisions and seek help from customer service. Readers will learn the channels that shoppers prefer in given scenarios and how to prepare their teams for optimal engagement.
Tags : 
live chat report, social media, purchasing behavior, logmein, internet shoppers, optimal engagement, retail
    
join.me
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Windstream     Published Date: Mar 26, 2014
With so much information about cloud computing, it’s hard to know where to go or who to trust for information. Here’s a short resource guide on cloud computing trends.
Tags : 
windstream, cloud, cloud trends, cloud computing, great migration, cloud security, data, cloud for business
    
Windstream
Published By: Teradata     Published Date: Feb 04, 2015
Optimize your customer experience with Teradata Integrated Marketing Cloud Teradata is recognized for vision, innovation and broad set of marketing capabilities. The 2014 Gartner Magic Quadrant for Integrated Marketing Management is an invaluable resource with insights that can help you execute your marketing initiatives.
Tags : 
teradata, integrated, marketing, vendors, executional, operational, analytical, campaign, management, resources, research, oracle, infor, microsoft, direxxis, sdl, repoint global, adobe, market, sap
    
Teradata
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Lumension     Published Date: Jun 03, 2015
Report leads to the security best practices that can better protect your information and your business.
Tags : 
    
Lumension
Published By: ServiceNow     Published Date: Oct 06, 2015
Les outils de gestion du support des services informatiques (ITSSM) sont essentiels pour les organisations Infrastructure et Opérations (I&O) afin de gérer la prise en charge et la prestation des services informatiques. Cette étude Magic Quadrant dresse le profil des principaux fournisseurs d'outils ITSSM afin d'aider les responsables I&O à faire des choix pertinents.
Tags : 
    
ServiceNow
Published By: Xactly Corp     Published Date: Sep 16, 2016
Over 100 companies participated in Xactly’s inaugural Sales Compensation Administration Best Practices Survey and provided us with information around the processes, approaches, and technologies they use to design and administer their sales compensation programs. The primary focus of this study was to better understand how sales compensation programs are typically managed and to provide companies with information so that they can self-assess where they stand in relation to their peers.
Tags : 
sales compensation, sales commission, sales payout, sales technology, sales best practices, sales performance management, incentive compensation, compensation management
    
Xactly Corp
Published By: Polycom     Published Date: Jun 08, 2016
"Over the years, the features, functions, and capabilities offered by group video conferencing systems have expanded and evolved. And the requirements and expectations of collaboration users have changed along with them. This 2016 Buyers Guide helps end users understand the features and functions needed to collaboration-enable five of the most common spaces found in enterprises of all sizes; - small (huddle) rooms - teaming spaces - standard meeting rooms - executive boardrooms - reconfigurable (and perhaps divisible) spaces Download the ""2016 Buyers Guide: Making Smart Group Video Collaboration Decisions"" by Wainhouse Research that will help you make informed decisions regarding your video collaboration strategy."
Tags : 
best practices, budget, business optimization, business management, collaboration
    
Polycom
Published By: Navex Global     Published Date: Jul 27, 2016
DATA AND INSIGHTS TO GET MORE VALUE FROM YOUR PROGRAM Most organizations have compliance training programs in place today. In most cases, these programs are pursued to both protect the organization and to help build a culture of ethics and respect. Yet too many programs stagnate and lose effectiveness as learner fatigue grows, content ages and key measurements and strategic targets are missed. The compliance training marketplace demands more current, diverse and compelling training and educational content designed for learners across the organization. This report will help you: • Access the information you need to evaluate the quality and effectiveness of your own • training program—and whether your program is protecting the organization or putting it at risk • Gain ideas from your peers for improving your own training program • Pinpoint areas in which your program may need to grow or evolve • Benchmark your training program against industry norms and best practices • Leverage our da
Tags : 
    
Navex Global
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant, siem
    
IBM
Published By: Thomson Reuters     Published Date: Feb 09, 2016
Download this report for insights from industry experts on some of the biggest corporate tax shakeups in 2015, as well as key topics to keep in mind in 2016 and what that all means for tax technology.
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, transfer pricing, beps, fatca, tax information reporting, global trade management, supply chain management, tax data management, global tax survey, indirect tax, property tax, statutory reporting, trust tax, country-by-country reporting
    
Thomson Reuters
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: Special Counsel     Published Date: Sep 18, 2015
Our 2016 Salary Guide takes an in-depth look at salaries for traditional legal occupations, as well as the most sought-after positions in growing areas such as Information Governance and eDiscovery. Accurate national and local salary data combined with up-to-date job descriptions provide you with the knowledge you need to engage, hire and retain premier legal professionals.
Tags : 
legal industry, legal talent, recruitment, job market, salary data, retention, legal talent
    
Special Counsel
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Dakota Software     Published Date: Mar 03, 2017
Since 2001, with the introduction of software tools for EHS and sustainability management, NAEM has been tracking the growth of the marketplace, the use of these tools within companies and the trends associated with software-supported data management.This biannual Buyers Guide report is a unique benchmark, designed to inform the software selection process, and to identify emerging priorities among software shoppers. It provides a peer perspective into many common questions asked, including in-depth information on the following topics: • Existing system maturity • Business objectives • Desired software capabilities • Peers spending and expected maintenance costs This detailed purchasing analysis provides current shoppers with a past purchasers’ perspective of expectations vs. reality. As a sponsor of the report, Dakota Software is pleased to provide this complimentary copy.
Tags : 
    
Dakota Software
Published By: iShares by BlackRock     Published Date: May 21, 2018
Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal.Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal. The iShares Funds are distributed by BlackRock Investments, LLC (together with its affiliates, “BlackRock”).This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 503791
Tags : 
finance
    
iShares by BlackRock
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Adecco     Published Date: Oct 05, 2017
To hire and retain top talent in today’s ultra competitive job market, you need accurate salary data. As the economy recovers and the unemployment rate declines, job seekers can be more selective—which often means waiting for the right salary. Although benefits, career paths, cultural fit, vacation time and work-life balance still matter, salary remains the most important factor to job seekers. In fact, two thirds of the respondents in Workforce 2020, an Oxford Economics and SAP SE study, said compensation matters most. Our Salary Guide helps you have more informed salary discussions and put together competitive compensation packages—the key to hiring and retaining the best talent.
Tags : 
    
Adecco
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.