HR Hero Your Employment Law Resource
 

box

Results 126 - 150 of 467Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Jul 22, 2019
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today’s market. Now there has been a shift away from these “black box” applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : 
    
TIBCO Software
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Iterable     Published Date: Sep 07, 2018
Email marketing continues to be the best digital channel for ROI, so delivering dynamic, personalized messaging to the inboxes of your customers is of the utmost importance. In fact, for 77 percent of consumers, email is the preferred messaging channel, dwarfing demand for SMS, push notifications and social media communications. When you are determining the right email marketing strategy for your business, it’s natural to wonder how the industry leaders are conducting their campaigns. A¬er all, if they’re on top, then they must be doing everything right...right? To glean best practices, we analyzed the email marketing strategies adopted by the top 100 e-retailers in the United States to study how they engage with their customers. These companies represent industries ranging from apparel and electronics, to auto parts and pet supplies, but all have the single goal of getting their users to go from inbox to checkout. We note what companies are doing across the board, as well as what spec
Tags : 
    
Iterable
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
The cloud is ubiquitous. Whether we think about it consciously or not, almost all of us are using cloud services. That could be a music service such as Spotify, storage such as Dropbox, communications via Gmail, or a software-as-a-service application such as Salesforce. Cloud services touch all of our lives.
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
La baie de stockage d’entreprise lnfiniBox® délivre des performances supérieures à la technologie tout-Flash, de hauts niveaux de disponibilité et une évolutivité de plusieurs pétaoctets pour des charges applicatives mixtes. Des instantanés zéro impact et une réplication active/active améliorent nettement l’agilité, tandis que le chiffrement des données au repos validé FlPS élimine la nécessité d’effacer les baies déclassées. Avec InfiniBox, les services IT des entreprises et les fournisseurs de services cloud surpassent les objectifs de niveau de service tout en réduisant le coût et la complexité de leurs opérations de stockage de l’ordre du pétaoctet.
Tags : 
    
Infinidat EMEA
Published By: Amazon Web Services     Published Date: Feb 01, 2018
Moving Beyond Traditional Decision Support Future-proofing a business has never been more challenging. Customer preferences turn on a dime, and their expectations for service and support continue to rise. At the same time, the data lifeblood that flows through a typical organization is more vast, diverse, and complex than ever before. More companies today are looking to expand beyond traditional means of decision support, and are exploring how AI can help them find and manage the “unknown unknowns” in our fast-paced business environment.
Tags : 
predictive, analytics, data lake, infrastructure, natural language processing, amazon
    
Amazon Web Services
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Microsoft     Published Date: Feb 15, 2017
Read this e-Book to find out how Azure Virtual Machines can deliver more productivity and help companies control their own budget decisions, infrastructure and in turn, their own destinies.
Tags : 
cloud, iaas, infrastructure as a service, smb's, infrastructure, productivity, azure, digital transformation
    
Microsoft
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
    
MessageLabs
Published By: SAS     Published Date: Nov 10, 2014
Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.
Tags : 
sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
SAS
Published By: Box     Published Date: Nov 28, 2012
We adhere to the highest industry standards for security at every level of the Box experience. You can share, manage and access your content with confidence.
Tags : 
mobile collaboration, enterprise collaboration, mobile content
    
Box
Published By: Box     Published Date: Nov 28, 2012
This IDC Insight explores the emerging category of solutions that offer access to business content (folders, files, documents, etc.) on mobile devices.
Tags : 
collaboration, collaboration solutions, mobile workforce, mobility, mobile workers, mobile enterprise
    
Box
Published By: Box     Published Date: Nov 28, 2012
End users need the right tools for document collaboration, and in the era of consumerization, they'll find them... with or without you!
Tags : 
cloud, cloud file sharing, cloud file sharing vendors, cloud vendors, dropbox, box, google drive, files sharing
    
Box
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
FireEye
Published By: Epicor     Published Date: Jul 18, 2017
Big-box retailers often have the resources, product variety, and name recognition to get ahead of smaller competitors. However, small and midsize businesses are able to crush the big-box stores where it matters most—the customer experience. Whether by design, geography, or as a matter of principle, small and midsize retailers are closer to their customers and are able to engage them on a level that big-box stores simply cannot. This closeness—combined with the right retail management system—allows smaller business to deliver a superior shopping experience with: • Special orders • Predictive inventory analysis • Digital, mobile channels and device integration This white paper—written by Innovative Retail Technologies and sponsored by Epicor—explains how the right software solution leads to a more agile retail strategy, which then leads to a better experience for your customers.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: Epicor     Published Date: Oct 29, 2018
Plant. Feed. Nurture. Grow. Retailers today face a variety of new challenges including a concentrated selling season, customers being lured away by big-box stores, and constant margin pressures. In this guide you’ll hear directly from Lawn and Garden retailers and learn how they have leveraged Epicor Eagle N Series to grow their business and drive superior customer service. Epicor Eagle software helps lawn and garden businesses grow and thrive. Download this guide and understand how businesses like yours use retail technology from Epicor to realize a wealth of benefits.
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, shopping cart software, customer satisfaction
    
Epicor
Published By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : 
employee habits, corporate it systems, dropbox, it infrastructure
    
Nasuni
Published By: SolarWinds     Published Date: May 18, 2015
It’s the newest trend in virtualization, simplifying hardware deployment with its “everything-in-a-box” approach, but what does it mean from a management perspective?
Tags : 
hyper-convergence effect, virtualization trends, hardware deployment, management perspective
    
SolarWinds
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Dotmailer     Published Date: Nov 06, 2018
This year’s Hitting the Mark showcased the email and customer experience tactics of 100 global brands. The report revealed both the triumphs and pitfalls of marketers as they bid to foster everlasting relationships from the inbox to the counter. This guide draws inspiration from the winning tactics adopted by brands big and small. Implement these now and you could come up top in next year’s Hitting the Mark.
Tags : 
    
Dotmailer
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.