att

Results 26 - 50 of 3854Sort Results By: Published Date | Title | Company Name
Published By: Evariant     Published Date: Nov 08, 2018
Smarter growth for healthcare providers requires a strong patient acquisition engine that can demonstrate ROI. By focusing on the financial impact of marketing efforts, healthcare marketers demonstrates why these efforts warrant further investment. This guide presents the Evariant approach to calculating service line ROI from marketing spend. It includes a standard set of formulas and optional factors that may be relevant to certain service lines and system-wide operations.
Tags : 
healthcare marketing, marketing roi, patient acquisition, marketing measurement
    
Evariant
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 24, 2019
A leading US-based broadcasting and publishing firm, with a market value of $17 Bn plus, creates, acquires and distributes entertainment content to global consumers over diverse platforms. The Company owns iconic media brands and has the viewership base amongst the US cable networks. The Broadcaster wanted to gain deeper insights into audience viewership patterns, advertisement impressions and sales data, in order to streamline the management of its advertisement deals. LTI's ADAPT (AD Sales Audience Prediction and tracking) solution optimized allocation, management, tracking and maintenance of advertisement air time to substantial increase in Marketing ROI.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: HERE Technologies     Published Date: Feb 12, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: HERE Technologies     Published Date: Feb 13, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: Pattern     Published Date: Jan 09, 2019
Like it or not, your products will appear on online marketplaces. The question is whether your company can assert the control over your online sales necessary—particularly on marketplaces— to win in this dynamic market environment. Read on to learn more about these challenges— and what your company can do to be positioned to win.
Tags : 
    
Pattern
Published By: Pattern     Published Date: Jan 28, 2019
As an eCommerce professional you're always looking for ways to sell more online. With Amazon capturing roughly 49.1 percent of all online retail spend in the United States it is the perfect platform to boost sales and awareness of your products. But with the number of sellers and products added to Amazon every day, how can your product rank number one in an Amazon search? Our Ultimate Guide to Amazon SEO will give you the tips and tricks you need to make the most out of your Amazon product listings and get to the top of Amazon's search results.
Tags : 
    
Pattern
Published By: Genesys     Published Date: Feb 08, 2019
Ausgereifte Cloud-Plattformen unterstützen die reibungslose Migration unternehmenskritischer Systeme in die Cloud. Dadurch wird deren Flexibilität und Skalierbarkeit gesteigert und es winken deutliche Kosteneinsparungen. Wie kann sich Ihr Unternehmen diese Vorteile sichern? Welche Schritte sind nötig, um den unvermeidbaren Umstieg auf ein cloudbasiertes Contact Center einzuleiten? Durch die Wahl des richtigen Contact-Center-Partners können Sie die Umstellung auf cloudbasierte Customer Journeys erfolgreich gestalten.Wissen Sie, wie Sie den richtigen Partner für die Migration finden können? Dieses E-Book nennt zehn Kriterien, die bei der Wahl eines Partners für den Wechsel zu einem cloudbasierten Contact Center zu beachten sind. Wenn Sie sich ein genaues Bild von den Anforderungen Ihres Unternehmens, den Fähigkeiten Ihres potenziellen Partners und der Übereinstimmung zwischen dessen Vision und ihren Unternehmenszielen machen, wird Ihnen dies bei der langfristigen Sicherung Ihres geschä
Tags : 
    
Genesys
Published By: Oracle     Published Date: Jan 08, 2019
No matter what your organization size, emerging technologies will impact you. Choosing the right path is a critical decision. Oracle can help automotive companies with a powerful combination of cloud technology and business applications.
Tags : 
    
Oracle
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Do you know what your employees are doing on your network? Do you know about the latest ransomware attack your security team is battling? How about your business partners? Are they secure? With all of these questions swirling around in your head, it’s hard to feel secure about network security. But there is one thing that could help: a solid plan. Perhaps you’re aware that your organization should have a formal incident response plan. Or maybe you already have one. But are you completely clear on all the components that should make up such a plan? Or what to do when things go wrong? Or how to get help when you need it? Over the next few pages, we’ll provide you with some insight to help you build and strengthen your organization’s incident response plan.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
    
Cisco Umbrella EMEA
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 14, 2019
Use Case Demo - How a Man-in-the-Middle attack is detected and remediated
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 12, 2019
Mobile solutions can be insecure and risk-prone. With MobileIron Threat Defense, healthcare organizations can immediately determine if a user’s mobile device is compromised, if any network attacks are occurring, and if malicious apps are installed on the device.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 12, 2019
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. This paper examines some current mobile threat defense approaches to help organizations understand where traditional solutions may fall short — and how machine learning-based threat defense can expand upon those capabilities by providing immediate, on-device protection against mobile attacks.
Tags : 
    
MobileIron
Published By: Genesys     Published Date: Feb 12, 2019
Abbiamo chiesto a una serie di analisti e figure di riferimento del settore di indicarci quali saranno secondo loro le tendenze chiave relative all’engagement del cliente a partire dal 2017. Da tecnologie all’avanguardia come l’IoT e i Bot fino a nuove interpretazioni di idee del passato, i temi caldi indicati hanno fatto emergere cinque trend fondamentali destinati a ridefinire il futuro della Customer Experience. In questo ebook, scoprirai: I cinque trend che avranno il maggiore impatto sulla Customer Experience Come usare il machine learning per identificare tendenze e modelli utili a offrire un’eccezionale Customer Experience di nuova generazione Come avere un contact center all’avanguardia e adattarlo alle esigenze in rapida evoluzione dei clienti
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
I tuoi clienti sono ultra connessi. Fai in modo di esserlo anche tu. Trovare nuovi clienti e mantenere relazioni con quelli esistenti è un’attività impegnativa che porta via tempo. Quando i tuoi clienti sono pronti a interagire, li incontri proprio lì dove si trovano? In un mondo dai contorni sempre più digitali è fondamentale per tutte le aziende essere in grado di comunicare quando e dovunque il cliente desideri, che si tratti di una chiamata telefonica, SMS, chat online o social media. Scarica subito questo eBook per scoprire: Come coinvolgere e interagire con i tuoi clienti in un mondo ultra-connesso Come rendere semplici ed efficienti le tue attività di engagement del cliente Perché è arrivato il momento di adottare una soluzione di cloud contact center all-in-one
Tags : 
    
Genesys
Published By: Engage2Excel     Published Date: Feb 11, 2019
The war for talent is a term that was coined by Steven Hankin of McKinsey & Company in 1997 to refer to an increasingly competitive landscape for recruiting and retaining talent. Today, this “war” has escalated to new heights, commanding the attention of CEOs across all industries. According to research recently published by McKinsey, more than three-quarters of Fortune 500 CEOs do not believe their companies are effective at attracting highly talented people. Of those CEOs who do consider their companies successful at attracting top talent, only 7% believe they are effective in retaining them. In today’s hyperconnected labor market, recruitment and retention are not separate problems; they are two sides of the same coin. Companies that have adopted integrated strategies for recruitment and retention have a significant competitive advantage. But according to McKinsey’s data, this group represents only a small fraction of the Fortune 500. The rest of the HR universe is under tremendous
Tags : 
    
Engage2Excel
Published By: Engage2Excel     Published Date: Feb 11, 2019
Teleworking has grown 115% in the past decade, according to the Society for Human Resources. However, in 2017, a number of large employers made headlines by abandoning their telework initiatives, citing the desire to improve communication, collaboration and teamwork. This move was surprising to many for two reasons: • Nearly three-quarters of millennials express a desire to have more opportunities to work remotely1. • Employers can save $11,000 per half-time telecommuter2. Do employees who work remotely feel less recognized, exhibit lower engagement levels or experience less attention from their manager? To find out, we conducted a regression analysis on our 2018 survey of 5,000 employees nationwide. The results presented on the following pages may surprise you.
Tags : 
    
Engage2Excel
Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: gyro     Published Date: Feb 01, 2019
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or — worse — damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
advertising, humor, qualitative research, quantitative research, b2b advertising
    
gyro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept