post

Results 1 - 25 of 421Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Jun 10, 2019
Read Security at the Speed of Your Network to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Oracle     Published Date: Mar 08, 2019
Did you know that organizations with advanced finance teams are more likely to have a compelling digital customer experience? The driver behind this trend? A digital, customer-first way of working with greater investment in talent, innovation, and advanced technologies such as artificial intelligence (AI) and machine learning (ML). While finance has long taken advantage of technology to help drive productivity and collaboration, the goalposts have recently moved. Todays organizations must adopt an agile finance operating model powered by emerging digital technologies and skillsetsto better support the demands of an economy driven by continuous innovation.
Tags : 
    
Oracle
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilients latest report, The Ponemon Institute Study on the Cyber Resilient Organization. Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Ahead     Published Date: Jun 05, 2019
Digital Business Continues to Move the Cyber Goal Posts Fortune magazine estimates that by the year 2020, US companies will spend $101 billion per year on cyber security, up 38% from 2016. With all of the money being invested in cyber security, why do the pace and complexity of new security threats continue to rise year after year? A big reason is that todays digital business involves a more mobile workforce with expectations of immediate and on demand access to data fronted by intuitive and engaging user experiences, and often underpinned by public cloud infrastructure for increased agility and time to market.
Tags : 
    
Ahead
Published By: Forcepoint     Published Date: Jun 06, 2019
With the rise of Office 365, IT departments are under pressure to adapt their security posture to protect the new ecosystem. But with a range of security concerns standing in the way of full adoption, teams are rushing to supplement Microsoft's out-of-the-box security with more robust third-party solutions. Download our whitepaper to find out which Office 365 security concerns are keeping your IT peers up at night and how they're overcoming them to enable greater collaboration and agility across their businesses.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. Youve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : 
cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Published By: SAP Hybris     Published Date: Oct 26, 2017
Supporting the Buyer Journey with Customer Service, which discusses the opportunity for customer service and support teams to improve the entire buyer experience through continuous pre and post-purchase engagement
Tags : 
    
SAP Hybris
Published By: SAP Hybris     Published Date: Oct 26, 2017
For companies and buyers alike, customer service has traditionally been used as a troubleshooting tool. Forrester found that companies believe that nearly 50% of all buyers still view customer service as a post-purchase resource, rather than a purchasing aid, and in response, companies have positioned their customer service capabilities to match that expectation. However, Forrester conducted a custom survey of 247 companies and found that this reactive, postpurchase-only customer service mindset can result in missed sales opportunities and contributes to greater purchase dissatisfaction.
Tags : 
    
SAP Hybris
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their companys security posture against their peers.
Tags : 
    
HPE APAC
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see whats on the horizon. Many clues are out thereand obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 05, 2018
In Cisco abbiamo aiutato migliaia di aziende a prepararsi per il GDPR, il che significa che ci stata fatta praticamente ogni domanda possibile sullargomento. Cos abbiamo pensato di riassumere le domande che ci sentiamo rivolgere pi spesso e di fornire alcune risposte utili per chi si sta avviando sul percorso della conformit al GDPR.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamais approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Workplace by Facebook     Published Date: Jun 17, 2019
Workplace connects everyone in an organization using familiar Facebook features like video calling, instant messaging, posts and groups. It works with other tools you already love, providing a simple and secure way for people to share knowledge, work together and build connected communities.
Tags : 
    
Workplace by Facebook
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSAs Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadnt already done so. For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition. The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSAs concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that theyd achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: SAP SME     Published Date: May 09, 2017
As informaes descritas abaixo so teis para compreender o contedo deste white paper de proposta de valor. Elas fornecem detalhes sobre o objetivo e o escopo do artigo. As principais definies tambm so dadas para as sees selecionadas do artigo a fim de fornecer esclarecimentos adicionais.
Tags : 
    
SAP SME
Published By: Lenovo and Intel     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Todays technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: Mobile devices, tablets, and interactive technology improve the patient experience Healthcare facilities can remotely monitor patient progress and health post-discharge Providers can leverage patient portals and other tools to promote population health Ensuring patient engagement success requires effective measurement And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : 
lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care, hospital to home, digital healthcare, power patient engagement
    
Lenovo and Intel
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
I database rappresentano spesso il motore su cui si basa l'attivit missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attivit del database pu rappresentare un grande vantaggio per la crescita aziendale.
Tags : 
    
Dell and Nutanix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.