pto

Results 326 - 350 of 436Sort Results By: Published Date | Title | Company Name
Published By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
irm, management, time-to-market, forgerock, revenue generator, software development
    
ForgeRock
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or WannaCry, became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus execution method was simple: it exploited a vulnerable Windows SMB protocol to spread an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: Lenovo     Published Date: Sep 11, 2012
Discover why IT Managers are recommending Lenovo's ThinkPad Carbon as an essential tool for a busy workforce that's always on the go.
Tags : 
macbook air, apple, ibm, lenovo, carbon fiber, infographic, laptop, mobile computer, mac, thinkpad, intel, remote access, small business networks, mobile computing, mobile data systems, mobile workers, wireless hardware, total cost of ownership, green computing
    
Lenovo
Published By: Symantec     Published Date: Jun 13, 2018
Todays workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches cant address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customers environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security, cyber threats, backup and recovery, data protection, database security
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : 
ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. Its the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centricity,
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. Its the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centrici
Tags : 
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
Forrester survey: global IT leaders plan their transition to consolidated, cognitive smartphone, tablet, laptop, and IoT security by 2020.
Tags : 
iot security, internet of things, mobility
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
IBM MaaS360 provides unified endpoint management (UEM) across desktops, laptops, tablets, smartphones, and the Internet of Things (IoT).
Tags : 
internet of things, uem, unified endpoint management, iot
    
Group M_IBM Q1'18
Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security, wireless security, utimaco, security, security management, pda
    
Utimaco
Published By: thawte     Published Date: Aug 27, 2008
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
thawte, ssl, encryption, internet security
    
thawte
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca), server gated cryptography, sgc, certificate management, certificate-revocation list, crl, international computing
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, international computing
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, wpa
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority, international computing
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: Mentor Graphics     Published Date: Sep 04, 2009
This paper looks at the issues, materials and current processes being researched to create this integrated Opto-Electronic Circuit Board by European, Japanese and North American organizations.
Tags : 
mentor graphics, high density interconnect (hdi), high speed applications, opto-electronics, photonics, pcbs, opto-electronic circuit board, eobc-optofoil, univ. of ulm, fraunhafer inst, daimler-chrysler, siemens, truemode, terahertz, polyguide, dupont, topcat, nist, goodyear, jiep
    
Mentor Graphics
Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing
    
Sage SalesLogix
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.