tactical

Results 1 - 25 of 87Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Aug 22, 2013
With more than 1 billion smartphones in consumers' pockets at the beginning of 2013, mobile is driving a second Internet revolution that's even more profound than the first one. Mobile creates new value for consumers and businesses, alters cost structures, and disrupts ecosystems. That's why marketers must move away from tactical mobile efforts to more transformative mobile marketing strategies in 2013. This fourth annual mobile trends report revisits our 2013 mobile trends, elaborates on how they will continue to evolve in 2013, and highlights new mobile trends that we expect to see this year. New to this year's report is a list of the over-hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
mobile marketing, mobile trends, mobility
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Mobile platforms will act as a catalyst for the next generation of connected experiences. In particular, smart apps connected to products and CRM systems will emerge. In 2013, leading marketers will anticipate the longer-term mobile disruption and shift from tactical efforts to more transformative mobile strategies.
Tags : 
adobe, forrester, mobile trends, interactive marketing professionals, marketing control, mobile platforms, crm systems, transformative mobile strategies, consumer behavior, ubiquity drive, mobile mind shift, mobile momentum, scaled-up investments
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
A key finding of this research is that most companies have a great opportunity to improve their business performance by taking a more integrated approach to managing their digital media mix.
Tags : 
adobe, econsultancy, media optimisation report, effective optimisation, media mix, tactical objectives, complex media landscape, consumer buying patterns, digital media, optimisation of media activity, online display, paid research, campaign performance, business imperatives, disparate ownership, outsourced to agency
    
Adobe
Published By: AtTask     Published Date: Jul 17, 2014
When it comes to project management, we tend to talk about the tactical—the assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
AtTask
Published By: Automation Anywhere APAC     Published Date: May 17, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
    
Automation Anywhere APAC
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
The current loyalty program environment is challenging but rife with opportunity. Many poorly designed programs are driving loyalty fatigue and mercenary loyalty. However, there are more loyalty memberships than ever before and those companies that are successful in driving engagement and true loyalty are experiencing significant returns. The programs that “get it right” and earn genuine loyalty don’t just repurpose an old tactical model or copy the competition – they are unique and create or reinforce differentiation in the marketplace. Learn how to design a loyalty program that focuses on the entire lifecycle of a customer.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty, customer incentive programs, customer loyalty program, customer marketing
    
BI WORLDWIDE
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA WA     Published Date: Aug 15, 2008
Infrastructure Performance Management (IPM) applies to operations quality. Implemented well, IPM frees you from constant firefighting and can transform your role from tactical first responder to strategic business enabler. Applying good IPM technology and processes can deliver a number of benefits to your career as well as to your organization. This report introduces IPM, offers tips for successful IPM implementation, and explores how IPM can benefit your enterprise as well as your career.
Tags : 
ca wa, computer associates, infrastructure, itil, infrastructure management, performance management
    
CA WA
Published By: CA WA 2     Published Date: Oct 01, 2008
Featuring an expert from Enterprise Management Associates, this webcast discusses some tactical steps towards automation of various IT processes, showing how even in processes with interdependent tasks, IT Process Automation can start IT groups down the path of reducing complexity and error rates, two of the leading drivers of cost and chaos.
Tags : 
ca wa, ca wa 2, process automation, it process, bpa, business process automation, it management, webcast
    
CA WA 2
Published By: Cisco     Published Date: Dec 23, 2014
Read how cloud technologies can help IT team’s transition from tactical systems administrators to strategic service brokers. In doing so, they can redefine their roles, transform their relationships with business groups, and help move organizational priorities forward.
Tags : 
cloud, cloud computing, role of it, it relationships
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, data management
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Forward-thinking IT departments are using the cloud as a transformative engine, helping them transition from tactical systems administrators to strategic service brokers. In doing so, they have an opportunity to redefine their partnership with business groups and become more influential, effective leaders of revenue and growth.
Tags : 
cloud, hybrid, iot, public cloud, service, automation
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
transformation, network, dod, networking, it management
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco
Published By: ClearSlide, Inc     Published Date: Feb 25, 2015
Organizations treat customer data as a key component of CRM. Many organizations see an effective customer data management strategy as an important cornerstone of their CRM strategy. Most organizations are moving beyond tactical CRM initiatives focused on saving cost and driving efficiency to making their organization more effective and focused on driving better customer engagement and experience. Customer data is used to enhance customer experiences, improve service quality, target marketing efforts, capture customer sentiment, increase upsell opportunities and trigger product and service innovation.
Tags : 
crm, big data, customer engagement, customer service
    
ClearSlide, Inc
Published By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : 
data center, it decision making, data center operators, it management
    
Compass Datacenters
Published By: Epicor     Published Date: Feb 20, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
cloud, erp
    
Epicor
Published By: Epicor     Published Date: Jul 10, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
cloud, erp
    
Epicor
Published By: Epicor     Published Date: Aug 15, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
erp software, enterprise resource planning software, saas, cloud erp, epicor erp
    
Epicor
Published By: EverString     Published Date: Jun 27, 2018
Programs and campaigns can be tough to plan; and more often than not, too many marketers rely on guesswork to get it done. Your numbers need to head in the right direction, so your team must match its resources and spending with your most critical priorities. This ebook will walk you through the 4 must-dos of marketing budget planning so that your team can be more tactical with spending.
Tags : 
    
EverString
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
Published By: Gleanster     Published Date: Nov 10, 2011
This comprehensive 25-page benchmark report explores the elements of a successful BI strategy along with a full vendor landscape. Some of the best examples of rapid ROI from BI projects are associated with tactical implementations that emphasize immediate results over a perfect system architecture.
Tags : 
    
Gleanster
Start   Previous   1 2 3 4    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.