• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

results

Results 326 - 350 of 1430Sort Results By: Published Date | Title | Company Name
By: Coupa     Published Date: Mar 07, 2016
With AP becoming a strategic hub, it's critical that companies focus on automation of AP processes to increase efficiency, accuracy and productivity. The report focuses on the state of AP and how best-in-class AP teams leverage automation solutions to improve business results.
Tags : 
    
Coupa
By: Coupa     Published Date: Dec 14, 2018
Organizations need a new way to manage this complexity and uncertainty in an environment where expectations for results are rising, not falling. Download this asset to learn how Business Spend Management (BSM) empowers both centralized and decentralized corporate functions with: - Fully scalable processes that increase user adoption and ease of use - Capital efficiency to maximize savings and process efficiency - Business agility to adapt to changing conditions such as acquisitions, growth, etc. - And much more! Download this complimentary report to learn all the ways BSM powers your business success!
Tags : 
    
Coupa
By: Coupa Software     Published Date: Oct 05, 2015
With AP becoming a strategic hub, it's critical that companies focus on the payment portion of the AP processes to illuminate what is now a critical component of total enterprise success. The report focuses on the state of AP and how AP teams leverage ePayables solutions to improve business results.
Tags : 
epayables, coupa, software, accounts payable
    
Coupa Software
By: Coveo     Published Date: Nov 13, 2013
Where does a Fortune 500 bank with 15,000 employees and a $90 billion in assets under management turn when it’s looking to unlock the potential in its internal knowledge base? KeyBank turned to Coveo.
Tags : 
enterprise search, unified search solutions, internal knowledge base, enterprise software, search engines
    
Coveo
By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
By: Cranfield University     Published Date: Jan 16, 2015
The Cranfield General Management Programme is a development experience that opens up new possibilities for senior managers.
Tags : 
new opportunities for senior managers, general management programme, senior managers
    
Cranfield University
By: Creekpath     Published Date: Aug 21, 2009
Supply chain storage management has become universally accepted in the marketplace as the umbrella term for the processes, methodologies and metrics that enable an enterprise to manage and monitor the results of its business activities. Can IT Operations Storage Management utilize the lessons of Supply Chain Management to realize business benefit?
Tags : 
supply chain, storage management, storage, storage operations management, storage infrastructure, cost control, creekpath
    
Creekpath
By: Crimson Hexagon     Published Date: Jan 17, 2013
In this webinar, Jehan Hamedi will discuss using social media to reveal consumer shopping expectations. Also, Jehan will be comparing two different campaigns that were similar in tactic but generated very different results. Click to watch now.
Tags : 
social media, reveal customer shopping, expectations, crimson hexagon, webinar
    
Crimson Hexagon
By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn the results from contextual analysis of millions of social media conversations surrounding Vine before and after the launch of Instagram video.
Tags : 
instagram, vine, consumer insights, online conversation, mobile video sharing, social media analysis
    
Crimson Hexagon
By: CrowdCompass by Cvent     Published Date: Jun 01, 2011
Surveys that not created using a systematic approach, the results can be inconclusive or irrelevant. These ten tips are designed to help create effective surveys that will deliver meaningful business intelligence.
Tags : 
cvent, web surveys, online surveys, feedback management, enterprise feedback management, create surveys, design surveys, survey design, survey creation, feedback collection, collect feedback, online feedback, customer feedback, customer satisfaction, feedback collection, collect feedback, marketing research, market research
    
CrowdCompass by Cvent
By: CrowdStrike     Published Date: Aug 01, 2017
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider,to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.Before initiating a change from your current AV solution read this guide to learn:?How to plan an AV replacement project and the critical elements to consider ?How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions?What prevalent technologies are available and what are the pros and cons of each??How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results?Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements. Before initiating a change from your current AV solution read this guide to learn: • How to plan an AV replacement project and the critical elements to consider • How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions • What prevalent technologies are available and what are the pros and cons of each? • How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results • Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources Organizations today have a wealth of security tools available to them but many struggle to take full advantage of the technology they have. Too often, this results in a damaging breach that could have been avoided if their solutions had been configured and updated properly or if detections had been noticed and acted on. How well your organization is doing at fully implementing its security solutions, particularly endpoint protection technology, is a reflection of your cybersecurity maturity. This white paper, “CrowdStrike Falcon Complete: How to Achieve Instant Cybersecurity Maturity for Organizations of all Sizes,” explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size an
Tags : 
    
CrowdStrike
By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : 
cloud security, crownpeak, security market, competitive dynamics, security, it management
    
Crownpeak
By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
By: Dassault Systèmes     Published Date: Jul 21, 2017
Project management relies primarily on past performance to predict future results, however many companies still lack forward-looking capabilities to predict project outcomes and ensure success. Enhancing project management with PLM analytics offers the opportunity to switch from task-based activities to performance-driven ones to improve success rates. Use PLM Analytics to: • Gain actionable insight and valuable intelligence • Dramatically boost business value and improve project management performance • Reduce error-prone behavior like manual data collection • Leverage big-data capabilities and project intelligence Learn how to extend the value of your PLM investment and improve business performance for your company.
Tags : 
product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed, manufactures
    
Dassault Systèmes
By: Dassault Systèmes     Published Date: Jun 19, 2018
Companies that manufacture industrial equipment find themselves in a unique place among manufacturers: • Their products can range from small components to mammoth machines for mines or mills. • They rarely order large production runs and may be called on to create a process that results in an order of one. • Their markets impose challenging constraints. Customers want more choices, more options, more extras, and more features. And they want the order to be fulfilled sooner. The competitive environment is forcing model cycles to shrink, pressuring manufacturers to accelerate processes that are unable to keep pace. Dassault Systèmes DELMIA has assembled an industry-specific set of roles for industrial equipment manufacturers that brings these challenges under control.
Tags : 
    
Dassault Systèmes
By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : 
storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
    
DataCore Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter