rsa

Results 151 - 175 of 592Sort Results By: Published Date | Title | Company Name
By: Polycom     Published Date: Jun 08, 2016
"Have you heard about Polycom’s groundbreaking new meeting collaboration solutions? Are you curious how Polycom® RealPresence Trio™, RealPresence Centro™ and others fit into your Skype for Business plans? View the on-demand webinar, “Create Exceptional Meeting Experiences with Skype for Business and Polycom: A Q&A with Jeff Schertz, Skype for Business MVP” for a conversation about Polycom’s newest solutions and see how they elevate the collaboration possibilities of Skype for Business. And how they can enhance your meeting experiences."
Tags : business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity
     Polycom
By: Oracle     Published Date: Aug 08, 2013
Social media is transforming customer care and should be considered a strategic vehicle for delivering excellent customer experiences. A majority of social conversations are ‘noise’, however, there are topics that are relevant to different parts of the organization. When the topic is customer-service-related, most organizations are ill-equipped to deliver the level of support needed resulting in a splintered, disjointed customer experience. Get your free copy of “Customer Care in a Social World” whitepaper where you will learn: • Three qualifications needed for a social-enabled contact center • To identify the stage of social-enablement for your contact center
Tags : customer care, social world, oracle, crm, social media, data management
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Social media is transforming customer care and should be considered a strategic vehicle for delivering excellent customer experiences. A majority of social conversations are ‘noise’, however, there are topics that are relevant to different parts of the organization. When the topic is customer-service-related, most organizations are ill-equipped to deliver the level of support needed resulting in a splintered, disjointed customer experience. Get your free copy of “Customer Care in a Social World” whitepaper where you will learn: • Three qualifications needed for a social-enabled contact center • To identify the stage of social-enablement for your contact center
Tags : customer care, social world, oracle, crm, social media, enterprise applications
     Oracle
By: Group M_IBM Q119     Published Date: Dec 20, 2018
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
In Forrester’s evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
     Group M_IBM Q3'19
By: EMC Corporation     Published Date: Oct 01, 2014
Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.
Tags : cyber attacks, virtual, security, analytics, ecat
     EMC Corporation
By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : cybersecurity, security risk, acquisition target, security ratings, risk-based conversations, security, it management, enterprise applications
     BitSight Technologies
By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : eset, cybersecurity webinar, security manager, it security
     ESET, LLC.
By: Lenovo UK     Published Date: May 15, 2019
Die zunehmende Mobilität verursacht für IT-Teams überall Kopfschmerzen mit dem Potenzial für erhöhte Kosten und Risiken. Mit ThinkPad, das auf Intel® Core™ i7 vPro™ Prozessoren basiert, erhalten Sie 360-prozentige Sicherheit, zuverlässige Haltbarkeit und uneingeschränkte Produktivität für jedes einzelne Gerät. Erfahren Sie mehr in unserem Whitepaper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität
     Lenovo UK
By: SAS     Published Date: Mar 06, 2018
Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
     SAS
By: SAS     Published Date: Aug 03, 2016
Data visualization is the visual and interactive exploration and graphic representation of data of any size, type (structured and unstructured) or origin. Visualizations help people see things that were not obvious to them before. Even when data volumes are very large, patterns can be spotted quickly and easily. Visualizations convey information in a universal manner and make it simple to share ideas with others.
Tags : best practices, data visualization, data, technology
     SAS
By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : strategy, ddos, spam, technology, solutions
     F5 Networks Inc
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : cyber attacks, live, virtual, security, analytics, ecat
     EMC Corporation
By: Genesys     Published Date: Jun 13, 2018
In today’s digital world, the messaging and texting that have become a prominent part of most people’s lives are a form of asynchronous messaging. These are a simple, convenient method of communication for people on the go, with varied time in response based upon intrigue and urgency. Asynchronous messaging has become so ingrained in consumers’ lives, an expectation has evolved that businesses should be able resolve issues just as quickly and easily, and on the customer’s timetable. To keep up with consumer expectations and offer differentiated customer experiences, there is a strong case for implementing capabilities where messages can be fielded by bots using artificial intelligence, with a human touch through skilled representatives, or a combination of both within the same conversation, without losing context. Download this white paper to learn about: • 6 benefits to asynchronous messaging in B2C customer experience and operations • Incorporating asynchronous messaging into your u
Tags : customer service, operations, asynchronous, messaging, customer expectations
     Genesys
By: Genesys     Published Date: Jul 13, 2018
In today’s digital world, the messaging and texting that have become a prominent part of most people’s lives are a form of asynchronous messaging. These are a simple, convenient method of communication for people on the go, with varied time in response based upon intrigue and urgency. Asynchronous messaging has become so ingrained in consumers’ lives, an expectation has evolved that businesses should be able resolve issues just as quickly and easily, and on the customer’s timetable. To keep up with consumer expectations and offer differentiated customer experiences, there is a strong case for implementing capabilities where messages can be fielded by bots using artificial intelligence, with a human touch through skilled representatives, or a combination of both within the same conversation, without losing context. Download this white paper to learn about: • 6 benefits to asynchronous messaging in B2C customer experience and operations • Incorporating asynchronous messaging into your u
Tags : 
     Genesys
By: Adobe     Published Date: Jan 12, 2015
To drive loyalty and revenue, brands need to deliver personalized, meaningful digital experiences. Many marketers are looking for an end-to-solution that delivers multi-channel experiences on any device and helps create personalized content for every customer. The ability to deliver digital experiences that differentiate your brand and deepen customer relationships is more crucial than ever to driving business success.
Tags : adobe, marketing, digital, multi, channel, personalization, experience, brands
     Adobe
By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : ibm, forrester, cloud, mobile, mobile applications
     IBM
By: InMage     Published Date: Feb 18, 2009
During challenging economic times, companies are increasingly questioning every budget dollar they spend. Furthermore, companies are reviewing their core vendor relationships to assess which partnerships have lived up to their expectations vs. which have overpromised and under delivered.
Tags : inmage, roi, data protection, it spend management, drscout, storage replication, downtime, universal data protection
     InMage
By: Dell EMC     Published Date: May 21, 2018
Office technology continues to become ever more powerful, versatile, and efficient, including display technology, which has made incredible strides in performance, functionality, agility, precision, and color. Dell is at the forefront of this rapid evolution of high-performance displays with innovative, award-winning monitors with a wide range of sizes, features, and price points.
Tags : 
     Dell EMC
By: Dell SB     Published Date: Jan 24, 2019
Dell Precision delivers versatile designs, top performance & reliability to conquer the industry’s most demanding applications. From award-winning filmmakers and animators to architects and engineers our expansive portfolio enables you to customize the workstation for your creative expertise.
Tags : 
     Dell SB
By: Cisco     Published Date: Apr 10, 2015
The new Cisco Nexus® 9000 Series Switches provide features optimized specifically for the data center: high 10 and 40-Gbps port densities, reliability, performance, scalability, programmability, and ease of management. With exceptional performance and a comprehensive feature set, the Cisco Nexus 9000 Series offers versatile platforms that can be deployed in multiple scenarios, such as layered access-aggregation-core designs, leaf-and-spine architecture, and compact aggregation solutions.
Tags : cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
     Cisco
By: Juniper Networks     Published Date: Jan 11, 2016
Sicherheit im Rechenzentrum ist eine der wichtigsten Prioritäten für Unternehmen. Laden Sie sich dieses IDC White Paper herunter, um einen topaktuellen, umfangreichen Einblick in die Themen zu erhalten, von der Bedrohungslandschaft bis hin zu Vorhersagen sowie aktuellen Lösungen.
Tags : 
     Juniper Networks
By: Veeam '18     Published Date: May 07, 2019
Wie wir inzwischen alle wissen, müssen unsere Abwehrmechanismen nur bei einer einzigen Phishing-E-Mail versagen, und schon ist unser Tag ruiniert. Nur ein Klick und der Angreifer ist in Ihrem Netzwerk, kann auf Endgeräte zugreifen und diese mit Malware infizieren, kann kritische Server unter seine Kontrolle bringen, Daten stehlen, unsere Bankkonten leerräumen oder dem Unternehmen anderweitig schaden.
Tags : 
     Veeam '18
By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
These days, everyone knows people use multiple channels for shopping, researching products, and communicating with friends and colleagues. Marketers have responded by using a variety of channels to communicate their message. In fact 55% of marketers use at least 10 channels within their marketing channel-mix according to the findings of recent Aberdeen research. The facts are: Utilizing multiple channels has become the ‘new normal.' Simply adding yet another channel within the channel-mix is not enough for marketers to differentiate their business. Instead, savvy marketers distinguish themselves by orchestrating campaigns across all channels to deliver truly personalized and consistent conversations. Download this guide to learn the business value marketers derive by mastering orchestration of omni-channel marketing campaigns. It’ll also reveal several building blocks marketers must use to achieve superior results.
Tags : 
     Oracle Marketing Cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com