business impacts

Results 26 - 50 of 59Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : 
b2b integration, customer loyalty, ibm, customer growth
    
IBM
Published By: Comcast Business     Published Date: Feb 06, 2017
The right network can enable banks and financial services firms to provide service that spans the branch office to the home office or mobile device, offering a seamless customer experience no matter how their business is conducted. It is imperative, then, that banks understand the impact their network has on the speed, agility and flexibility of the systems that serve their customers, which ultimately impacts their bottom line.
Tags : 
    
Comcast Business
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: Group M_IBM Q418     Published Date: Nov 20, 2018
Understanding how to optimize Omni-Channel Order Management is key to your business’ success. Today, consumers want seamless possibilities for selecting and receiving new products and services. Intelligent order management systems allows brands and retailers to make informed decisions on how to profitably satisfy customer expectations. It’s not just about understanding what you are offering in the present, but transparency and greater understanding of each aspect that impacts your inventory, fulfillment network, and capability to deliver across your channels.
Tags : 
    
Group M_IBM Q418
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, it management
    
Palo Alto Networks
Published By: NetIQ     Published Date: Nov 05, 2012
An analysis of the annual Gartner survey of CIOs' most urgent priorities identifies the business and technology concerns where identity and access management has business-relevant impacts.
Tags : 
gartner, iam, identity and access management, cio, business priorities, iam initiatives, security, business technology, research
    
NetIQ
Published By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
    
Oracle
Published By: Workday     Published Date: Feb 01, 2019
In today’s IT landscape, many organizations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions • If your company is ready to make the switch to SaaS From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Symantec     Published Date: Jul 28, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Red Hat     Published Date: Jan 07, 2019
Access to data anytime and anywhere is a requirement in both our personal and professional lives. IT organizations must deliver better applications faster to stay relevant and seize business opportunities. This checklist will help organizations choose a cloud-native platform by helping to assess business needs and impacts. It also details the features and benefits of Red Hat® OpenShift Container Platform.
Tags : 
    
Red Hat
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
For many companies, facilities operations and management represent a significant business cost. Thinking of fixed assets as a source of economic advantage allows companies to optimize their processes and resource use to simultaneously reduce environmental impacts and lower cost.
Tags : 
ibm, smarter buildings, fixed assets, go green, environment, finance
    
IBM US Smarter Buildings
Published By: Okta APAC     Published Date: Dec 19, 2018
Multifactor authentication (MFA) is a critical security requirement for every organization, regardless of size and industry. But not every MFA solution is created equal. Your investment in MFA should be well-thought-out. Not only does your chosen MFA solution need to meet the requirements you have today, but it needs to enable and secure the future growth and evolution of your business. This evaluation guide will help you understand the key factors you need to consider when investing in MFA. Your MFA choice determines how well you can protect access to all your internal resources, as well as your ability to provide frictionless experiences for your internal employees and external customers. Your MFA choice also impacts your ability to grow your business and take advantage of emerging technologies and future innovations. As part of Okta’s identity-led security framework, Okta Adaptive MFA delivers on the key considerations that need to be part of your search for a solution that meets a
Tags : 
    
Okta APAC
Published By: Payscale, Inc     Published Date: Jun 15, 2018
Leading a successful business means knowing the market, understanding product trends, hiring the right people, enabling those people, staying on top of expenses, making the right investments and countless other responsibilities. One area you may or may not have on your mind is compensation. In today’s tight talent market and ever-increasing competition spurred by technology, the web and globalization, getting compensation right is more important than ever. It impacts recruiting and retention, sure, but it also affects company culture and even your bottom line. It has legal implications, too. With the changing demographics (and expectations) of the current workforce, plus automation opportunities today’s software provides, it’s time to modernize your organization’s compensation. In this guide, we’ll share in detail the reasons you should make modernizing your comp a priority, the value and ROI of implementing modern compensation software and specifically how PayScale’s modern comp solut
Tags : 
    
Payscale, Inc
Published By: Rosetta Stone     Published Date: Aug 04, 2016
Proving the value of language training to business can be challenging so we decided to take the guesswork out of it. We surveyed 56,000 of our business product users to gain key insights into how language training has changed their businesses. This infographic shares the key results to help human resource, learning and development, and business line leaders better understand how language impacts business.
Tags : 
    
Rosetta Stone
Published By: Interactive Intelligence     Published Date: Jan 17, 2014
Learn how technology can be the key to responding to the aging utility workforce and how the right system can increase overall operational efficiency.
Tags : 
workforce, utility, labor force, employees, utilities, interactive intelligence, utility workforce, business process, process automation, new technologies, content management, human resources, aging employees, knowledge management
    
Interactive Intelligence
Published By: Red Hat     Published Date: Dec 15, 2017
IT organizations must deliver better applications faster to stay relevant and seize business opportunities. And to promote growth and digital transformation, organizations must find the right balance between developer effectiveness and operational efficiency. This checklist helps assess business needs and impacts to help you choose a Linux® container. It also details the features and benefits of Red Hat® OpenShift Container Platform.
Tags : 
    
Red Hat
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection, failover, points of failure, workforce continuity plan, disaster recovery plan, disaster response, voip, security
    
Cisco
Published By: Cornerstone OnDemand     Published Date: Jan 25, 2011
Most talent management solutions are missing the one critical component that will make positive business impacts a reality - learning. The "Failing to Learn" whitepaper helps outline the best combination of learning management system and talent management application that will maximize revenue growth by addressing learning's role in onboarding, performance, succession, compensation, and social networking.
Tags : 
cornerstone ondemand, talent management, learning management, human resources, compensation, onboarding, performance, benefits
    
Cornerstone OnDemand
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Prepare your business for the future of customer service. In a world where price and product can easily be matched, customer experience has become a key brand differentiator. It’s never been more important to understand customer expectations, perceptions, preferences, and trends. The 2017 Microsoft State of Global Customer Service report found that customer service impacts brand choice and loyalty for 96% of consumers around the globe. The 32-page report offers insights from 5,000 survey participants. Learn how you can stay ahead of the competition and earn customers for life with intelligent customer service. Find trend details and actionable data on: The growing importance of service in a customer’s choice of or loyalty to a brand The most important aspects of a good customer service experience The most frustrating aspects of a poor customer service experience Expectations of the millennial customer segment Channel preferences based on geography Customer expectations for self-serv
Tags : 
    
Microsoft Azure
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security, business technology
    
Symantec.cloud
Published By: WebEx     Published Date: Apr 02, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended. To harness the benefits of the new work order, organizations are looking to achieve true collaboration with customers, partners, suppliers and employees. Simply put, the mantra is to "improve productivity while lowering costs." Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : 
webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
    
WebEx
Published By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : 
webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
    
WebEx.
Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device, business technology
    
Webroot
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept