event id

Results 276 - 300 of 463Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Feb 04, 2015
Seventy percent of Americans are seriously concerned about identity theft. More than two thirds of online shoppers don’t complete their purchase because of price. In the world of e-commerce, you need a targeted marketing strategy to ensure you’re offering customers the reassurance and guarantees they need to browse and buy confidently. Symantec’s Norton Shopping Guarantee gives you just that. Online stores are seeing a dramatic return on investment when they use it. For merchants and customers alike, it’s satisfaction guaranteed.
Tags : e-commerce, identity theft, targeted marketing strategy, reassurance and guarantee, return on investment, security
     Symantec
By: Tyco Integrated Security     Published Date: Dec 08, 2014
See how a video system can benefit your business by both preventing security risks and providing evidence if a safety event does occur.
Tags : video surveillance, exposure to liability, business intelligence
     Tyco Integrated Security
By: Oracle     Published Date: Jun 20, 2016
This report examines how two major players in the grocery, pharmacy and wholesale markets are leveraging loss prevention technology to centralize enterprise-wide data collection, analysis, and reporting to protect profits, reduce shrink and provide actionable insight across the organization from merchandising and planning to supply chain.
Tags : analytics, loss prevention, enterprise applications, best practices, business intelligence, business metrics, content management system
     Oracle
By: KPMG     Published Date: Nov 07, 2016
Seemingly unrelated events can conspire to harm your business when you rely on far-flung networks of suppliers, vendors, and service providers. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends, enterprise applications
     KPMG
By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security, data encryption
     Citrix ShareFile
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, security, best practices, business intelligence
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks, web risks, social media risks, security, wireless security, best practices, risk management, data protection
     Kaspersky Lab
By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : activeservice, stratus, fault tolerance, ftserver, application management, virtual technician, application integration, application performance management, business activity monitoring, business management, project management
     Stratus Technologies
By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology, authentication
     IDology
By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : drm solutions, locklizard, document protection, secure file sharing, security, identity management, internet security, intrusion detection
     LockLizard
By: LockLizard     Published Date: Dec 08, 2008
This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
Tags : locklizard, data leakage, information leakage, secure information, security, internet security, intrusion prevention, security management, data protection
     LockLizard
By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : progress software, idc, complex event processing, business intelligence, cep, mom, application performance management, business activity monitoring, business management, business process automation, business process management, analytical applications
     Progress Software Corporation CEP
By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : progress software, idc, complex event processing, apama, transport, logistics, kpi, greening, consolidation, lifecycle, business activity monitoring, bam, business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom, application performance management
     Progress Software Corporation CEP
By: SAS     Published Date: Oct 18, 2017
Health insurers have long been plagued by issues of fraud, waste, abuse, error and corruption. Taking an enterprise approach to payment integrity – one that combines advanced data management and sophisticated analytics – can help payers detect and prevent fraud; effect positive change in how providers, employees and patients behave; and substantially reduce health care costs. Payers can achieve better outcomes when software support for the core disciplines of payment integrity run on a single platform.
Tags : 
     SAS
By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
     NetIQ
By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : data, mining, detect, insurance, fraud, insurers, fraudulent, claims, insurance, data, mining, techniques, audit, analytical, techniques, fraud, detection, it management, data management
     IBM
By: IBM     Published Date: Aug 08, 2012
Your goal is clear-produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize uptime and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : ibm, technology, manufacturing, predictive maintenance, productivity, minimize downtime, reduce costs, white paper, business intelligence, performance management, best practices
     IBM
By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : ibm, technology, predictive operational analytics, spss, business analytics, business intelligence, business management, application integration, analytical applications
     IBM
By: IBM     Published Date: Apr 18, 2012
IBM Tivoli Netcool/OMNIbus is a "manager of managers" designed to collect and correlate events and provide a holistic "single pane of glass" view into the health and performance of the entire business IT and network infrastructure, with its increasingly instrumented devices.
Tags : ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, application integration, analytical applications, software compliance, service management
     IBM
By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network, video delivery, content publishing, content publishing workflow
     Limelight Networks
By: CDW     Published Date: Mar 31, 2015
The stadium has long been a communal gathering place. The excitement of a live event bonds fans and teams together, and technology can enhance that visceral connection as well as expand the in-stadium experience to the outside world. Download this infographic to see how the right technology - deployed effectively - can make a major difference.
Tags : networking, stadium wifi, wi-fi, technology, customer experience, wireless, it management
     CDW
By: dynatrace     Published Date: Mar 04, 2015
Will your online business actually be able to keep up with increased demand and the increasingly less forgiving expectations of your users when your big event season occurs? If you’re not sure, or even if you think you are, this brief guide and check list can help you as you head into your peak online period. This guide summarizes feedback from hundreds of leading companies that we’ve worked with and creates what most would consider a “survival guide” for any big season or peak online event. The ultimate goal is high conversion rates, followed by implementing changes based on lessons learned post-event. In addition, this guide will help teams plan for the explosion of today’s mobile online shoppers!
Tags : survival guide, conversion, online business, mobile, shoppers
     dynatrace
By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : continuity requirements, vmturbo, virtualization, workload portability, data replication, it management, knowledge management, enterprise applications
     VMTurbo
By: Phunware     Published Date: Jun 24, 2014
For event producers and franchise owners, keeping fans engaged and committed is crucial to maintaining and growing the business’ success. Download our guide and get insight on, why event marketers are losing touch with fans, why move to mobile and how to increase fan engagement—both at the event and beyond.
Tags : sports franchises, mobile apps for fans, sports team mobile app
     Phunware
By: Cornerstone OnDemand     Published Date: Jul 16, 2015
Did you know that without a talent management strategy, a company with 2,000 employees is losing almost $2 million every year in preventable turnover alone? The new eBook, Why Your Nonexistent Talent Management Strategy is Costing You Money – And How to Fix It, shares the alarming hidden costs of managing employees “the way you've always done it.” If your organisation is still relying on manual processes to save money, this eBook will show you what you may be leaving on the table and steps you can take today to turn that around. You'll learn how a better talent management strategy can help your company achieve: • a 15% increase in earnings • more than 2x the median revenue per employee • 41% lower turnover rate among high performers
Tags : management strategy, talent management, performance, turnover, benefit
     Cornerstone OnDemand
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.