client

Results 326 - 350 of 1060Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: SAP SME     Published Date: Nov 02, 2017
Existen muchas oportunidades disponibles para las empresas de servicios – desde los seguros hasta el transporte, las telecomunicaciones y la construcción. Poder aprovechar esas oportunidades depende del fortalecimiento de los contactos entre su personal, sus activos, su infraestructura y, por supuesto, sus clientes.
Tags : 
    
SAP SME
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"IDC's recently published report “IDC MarketScape: Worldwide Virtual Client Computing Software 2016 Vendor Assessment” (doc #256606, November 2016) named VMware as a leader. According to the IDC MarketScape report, “It would appear that the commitment made in 2013 (by VMware) is resulting in solid gains and the strategies that were employed have been effective. These elements, along with reference interviews, provide VMware with a solid rating in the IDC MarketScape. As a result, IDC has placed VMware in the Leaders category in this IDC MarketScape. VMware's position reflects the company's market position and commitment to providing resources to expand its VCC product portfolio as well as supporting software and hardware solutions.” Be the first to receive an excerpt of the IDC MarketScape: Worldwide Client Computing Software 2016 Vendor Assessment, available from VMware. Register now to access your copy.
Tags : 
    
VMware AirWatch
Published By: Mitel     Published Date: Apr 07, 2017
Imaginez un centre de contact. Votre esprit a t-il visualisé une multitude de petits espaces de travail séparés par de petites cloisons et occupés par des agents parlant dans des micros-casques ? Il y a peu, la plupart des centres de contacts ressemblaient à ça : un lieu de travail unique, vers lequel des agents convergeaient quotidiennement pour y retrouver leur bureau.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Le consommateur d'aujourd'hui est en constante évolution. Toujours plus mobile, imprévisible et exigeant, ce nouveau consommateur a le monde à portée de main. De plus, devenu mobile, il crée et contrôle le contenu d'Internet. Avec le poids que donnent les plateformes sociales à tout consommateur, les premières impressions n'ont jamais été aussi importantes. La commodité et la flexibilité sont essentielles, au point que la meilleure expérience client est souvent celle qui comporte le moins de contact avec le client.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
L'expérience client est un facteur clé de différenciation dans l'environnement ultraconcurrentiel actuel. Plus que jamais, cette expérience est façonnée et proposée via des interactions numériques. Bien que la majorité des communications se font toujours par téléphone, les consommateurs comptent maintenant davantage sur les méthodes numériques, telles que le courrier électronique, les SMS, le chat en ligne et les réseaux sociaux. Les consommateurs se sont habitués au confort de pouvoir contacter l'entreprise par le média qui leur convient, où qu'ils soient. Ils s'attendent également à pouvoir basculer sans difficulté d'un moyen de communication à l'autre lorsqu'ils sont en déplacement.
Tags : 
    
Mitel
Published By: Ping Identity     Published Date: Feb 12, 2016
A key technical underpinning of the cloud and the Internet of Things are Application Programming Interfaces (APIs). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the cloud.
Tags : 
    
Ping Identity
Published By: SilkRoad Technology     Published Date: Feb 24, 2016
Gone are the days when employees leave a company and are never heard from again. People share experiences on Glassdoor and LinkedIn. Also, an employee may come back, turn into a contractor, or even become a client. Departing employees now have power and today’s leading edge companies are asking, “How can we create a win-win departure?”
Tags : 
silkroad, human resources, offboarding, employee, roadmap
    
SilkRoad Technology
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
data security, accounting, cloud security, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients’ cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : 
accounting, risk reduction, encryption, compliance, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
finance, data encryption, cyber security, data efficiency, client expectations
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: The common challenges of data security Steps to solve these challenges And much more
Tags : 
finance, data security, security risks, encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
54% of UK office workers spend some of their time working away from the office, but how do you make sure they’re able to interact with clients and each other? You can’t afford to miss a beat. Download this e-Book for 5 tips to collaborate with your clients from anywhere, including how to: Use the cloud without compromising security Make client meetings feel more personal Customize your mobile alerts to ensure they’re helpful
Tags : 
remote work, client interaction, collaboration, cloud security, personalization
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, encryption, efficiency, compliance
    
Citrix ShareFile
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.