identifying

Results 1 - 25 of 226Sort Results By: Published Date | Title | Company Name
By: Kazoo     Published Date: Oct 11, 2019
Are you ready for a new Recognition & Rewards Platform? Recognition and rewards are an integral part of your company’s employee experience and engagement levels. To determine whether an HR technology provider is the right fit for your organization, we recommend asking questions that address the various components of recognition and rewards, as well as background on the provider’s company and technology. Download our buyers guide for the five major areas you'll need to cover before making a purchase, including: The business value and ROI of recognition & rewards Identifying your need and specific goals for an employee experience program Key questions to ask engagement platform vendors A decision checklist and a detailed comparison sheet Two budgeting exercises to justify your investment
Tags : 
     Kazoo
By: PwC     Published Date: Sep 18, 2019
The traditional payer business model is fast becoming obsolete. Blues organizations that cling to the status quo or business as usual risk jeopardizing their reputations and business, because people are more than patients. Increasingly, employers are driving the growing demand for more solutions to engage customers. In response, healthcare incumbents and new entrants are building solutions to address rising costs and meet consumers’ demands for personalization, price transparency, access, and seamless, simple experiences. Proactive engagement can help your members lead healthier lives while improving outcomes for payers and other players. With 5% of Americans consuming 50% of healthcare costs, identifying and engaging high-risk, high-cost customer segments is essential to sustainability.
Tags : 
     PwC
By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
     ttec
By: Genesys     Published Date: Jun 27, 2019
Key considerations for navigating a successful migration journey
Tags : 
     Genesys
By: PatSnap     Published Date: Sep 27, 2019
Out-of-box tools that use AI, machine-learning, and real-time intelligence are driving the commercialization of IP today. However, IP professionals are faced with a dizzying array of offerings on the market. What features are must haves for IP teams in 2019? What processes will streamline the commercialization process? This eBook works as a clear guide in identifying the tools IP teams need to commercialize with confidence, in 4 easy-to-action workflow tips: 1. Confirming patent novelty easily 2. Deciding on ideas that are worth pursuing 3. Collating key data via analysis and patent landscaping faster 4. Mitigating bottlenecks through interdepartmental collaboration
Tags : research and development, intellectual property, innovation
     PatSnap
By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
     Coupa
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
It seems strange to think that just a few years ago, the IT department was considered a supplier to the organization. Today, IT leaders are at the forefront of their companies’ march into the digital age. Technology is now recognized as a key enabler for achieving strategic business goals, including revenue growth, market expansion, and customer satisfaction; and IT leaders have risen to the challenge of simultaneously running the organization while identifying and leveraging innovative solutions that can drive growth.
Tags : it leaders, business goals, innovative solutions, customer satisfaction, infrastructure improvement
     Hewlett Packard Enterprise
By: Oracle     Published Date: Nov 29, 2017
IT executives are in one of the most dynamic, challenging business environments of all time. The business expects speed; the IT function strives to keep up while pursuing innovation and efficiency. Many CIOs recognize that cloud is a possible solution to achieving both but they are uncertain about the best way to get there. Whether your company seeks to modernize IT, fuel innovation or accelerate growth, you’ll find that by identifying the most appropriate cloud journey for your organization, you can determine the best potential entry points to cloud migration as well as identify, prepare and prevent possible roadblocks. And, you’ll discover how the right cloud platform and partner can enable your success by leveraging different layers of the cloud to reach your desired business outcomes—and ultimately achieve true business transformation.
Tags : 
     Oracle
By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : poneman, credential stuffing, it security, damage mitigation, research report
     Akamai Technologies
By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
     Freshdesk
By: HP Enterprise Business     Published Date: Jan 20, 2017
A fresh approach to cloud-based website load testing is proving more effective in identifying and isolating application performance anomalies.
Tags : 
     HP Enterprise Business
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mid-market organizations globally are approaching mobility. Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and business leaders’ views, priorities, and objectives align and differ • Building a global and local view from over 1400 total respondents and over 570 who consider themselves mid-market, across 14 countries in every geography
Tags : 
     Cisco
By: Pega     Published Date: May 25, 2016
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category. Download this Forrester Wave report and gain insight regarding how well each vendor fulfills the criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : digital business, technology, best practices, forrester, enterprise
     Pega
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Storage is normally the first suspect when identifying the causes of the App-Data Gap, but the facts tell a different story. Flash Alone Isn’t Enough. Infrastructure complexity makes it difficult to pinpoint the real problem, resulting in: • Extended downtime and frustration • Inefficient use of IT resources and budget • Long hours spent resolving cross-vendor issues
Tags : 
     Hewlett Packard Enterprise
By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
     Adobe
By: DocuSign UK     Published Date: Nov 06, 2018
"With every week that passes, our dependency on paper wanes as digital processes are introduced into every aspect of our daily activity. If you want to sign a contract, book a restaurant or make a bank transfer, you can do so digitally – it is ingrained in our lives. Taking an entire business digital can be more challenging and reliant on many more moving parts. Identifying how businesses are evolving to meet these rapidly changing demands is essential for decision makers across all sectors of the economy to prepare their organisation or department accordingly to undertake successful digital transformations. This eBook investigates digital expectations from both the consumer and business perspectives. It identifies what action is being taken to meet the demand in the market and where the main challenges lie for businesses that are trying to deliver the digital experience their customers want."
Tags : 
     DocuSign UK
By: Riverbed     Published Date: Jan 25, 2018
"When apps run efficiently, employees are more likely to use them.” The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach helps you
Tags : 
     Riverbed
By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
     Dome9
By: Limelight Network     Published Date: Aug 12, 2019
To provide the best possible streaming video experience that will increase revenue and customer satisfaction, many organizations engage the services of a Content Delivery Network (CDN). However, to choose the right CDN for your video workflow and business requirements, you must first evaluate your unique needs. The following provides guidance for identifying the key considerations and questions to ask.
Tags : 
     Limelight Network
By: Limelight Network     Published Date: Aug 12, 2019
To provide the best possible customer experiences that will increase revenue and customer satisfaction, many organizations engage the services of a Content Delivery Network (CDN). However, to choose the right CDN for your workflow and business requirements, you must first evaluate your unique needs. The following provides guidance for identifying the key considerations and questions to ask.
Tags : 
     Limelight Network
By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com