World Retail Banking Report 201507/05/2015 Analytics, Banking, Banking Technology, Big Data, Customer Engagement, Customer Experience, Digital, Financial Services
Banks are undergoing a global stagnation that is translating into a flight riskfor customer and opening the doors to competitors, according to Capgemini’s 2015 Global Retail Banking Report. Drawing on one of the industry’s largest customer experience surveys – including responses from mo
World Insurance Report 201507/05/2015 Analytics, Big Data, Digital, Insurance
Insurers are being confronted by several waves of disruptive changes that threaten to upend long-standing ways of doing business, according to Capgemini’s 2015 Global Insurance Report. Extensive consumer research based on surveys of more than 15,500 consumers across 30 countries document
Leaders In Sales Analytics: Closing Deals With Data02/05/2015 Business Intelligence
Top sales performers are adopting the philosophy and parlance of data scientists to drive smarter sales strategies and close more business.
Insurance Agency Reduces Costs and Improves Productivity with Cloud Messaging from OpenText02/05/2015 Business Process Management
This report reveals how Bankers Insurance was able to ease the IT burden, improve employee efficiencies and reduce costs by moving to a cloud-based faxing solution with Fax2Mail.
Investec Asset Management Shows High Returns from All-Flash Array28/04/2015 Data Centre, IT Systems Management, Productivity
Investec Asset Management had plenty of challenges with their existing data centre storage and decided to replace their old hard drive system. Download this one-page case study to discover how Investec overcame their management and performance backlogs with a new virtual environment.
Empowering Sales with Self-Service BI24/04/2015 Business Intelligence
This e-book contains principles from four inspired books each containing powerful, transformative ideas based on the principles of happiness, loyalty, innovation and strategy.
Six Considerations for Securing a BYOD Workforce10/04/2015 IT Systems Management, Mobility, Security
How many devices does your business use? Whether a company provides iPads and laptops or employees bring in their own, more devices means more headaches for IT. Risky cloud sharing, unsecured wi-fi and lack of data encryption can be very costly.
Driving Customer Centricity in a Digital World10/04/2015 Big Data, Business Intelligence, Business Processes, Core Systems, Customer Data, Customer Engagement, Customer Interaction Management, Customer Relationship Management, Data Centre, Digital, Insurance
The rise of the ‘empowered consumer', coupled with the push towards digital distribution models, is fundamentally reshaping the insurance products of today.
The Flash Revolution Advances as the All-Flash Array Market Reaches a Tipping Point08/04/2015 Data Centre, IT Systems Management
Breakthroughs in flash cost and compatibility have allowed for faster and more efficient data centres and a more reliable alternative to traditional hard disk infrastructure. If you’re making the move to all-flash storage, download the following Gartner-sponsored report to help you compare SSA vendors (Solid State Arrays) and discover valuable insights into the changing state of IT storage.
Mind over metrics – how social media and analytics have changed insurance01/04/2015 Analytics, Social
Insurance companies cannot rely on traditional structured data alone if they are to prosper in the digital age, according to a panel of industry experts and technology leaders. FST Media’s 9th annual Technology & Innovation — the Future of Insurance conference featured a panel discus
Sales performance: Are you a laggard or leader?27/03/2015 Business Intelligence
By connecting data from a variety of data sources, including CRM, marketing automation, and finance systems, Qlik® provides greater visibility across the entire sales cycle, allowing sales to better plan and improve performance.
5 Steps to Improve Email Compliance17/03/2015 Security
While regulations governing email security can be complex, email security doesn’t have to be. This whitepaper outlines 5 straight-forward steps that organisations can follow to develop an effective policy to help address technical security safeguard standards for email.
Old techniques, new channel: mobile malware adapting PC threat techniques13/03/2015 Security
Learn how to mitigate fraud risks even as cybercriminals innovate and extend PC threat techniques to the mobile device. Discover how cybercriminals steal credentials from a victim’s PC via malware or phishing to commit account takeover through the mobile channel and more.
Adding Extra Security to Cloud Storage09/03/2015 Cloud, IT Systems Management, Security
Last year over a billion digital records were compromised worldwide. Today’s organisations possess information stockpiles that have immense appeal for criminal hackers. Regrettably, with the increasing sophistication and capability of the modern hacking threat, leading industry figures now appreciate it’s not a matter of 'if' a breach will occur, but 'when'.
This complimentary white paper explores the inevitability of data breach for today’s businesses, and an elegant solution to protect your sensitive data across your entire business network, both on-premise and in the cloud.
The Pitfalls of Two-Factor Authentication08/03/2015 Security
Prevent cybercriminals from identify theft and financial fraud today. Explore the shortcomings of two-factor authentication and how you can help identify the root cause of malware, phishing attacks and combat against new Trojans such as Dyre, Zeus, Citadel, Shylock and more!
This white paper explores the shortcomings of two-factor authentication, including its inability to defend against identity theft and transaction signing, as well as its negative impact on end-user experience.