reach

Results 276 - 300 of 1513Sort Results By: Published Date | Title | Company Name
Published By: Akamai     Published Date: Jul 06, 2010
Founded in the Queensland outback in 1920, Qantas Airways is the world's longest continuously operating airline. Today it is widely regarded as the world's leading long-distance airline and one of the strongest brands in Australia, responsible for an estimated $1.7 billion in revenue for the fiscal year 2009/2010. The airline is committed to continually improving the experience on its website, qantas.com, whether enabling travelers to book all parts of a holiday or to self-manage their travel experiences. Since the site was first launched in 1996, it has evolved into the airline's primary customer contact channel.
Tags : 
qantas, case study, site performance, clicks, travel, e-commerce, ecommerce, uptime
    
Akamai
Published By: Lieberman Software     Published Date: Mar 27, 2012
Lieberman Software offers a solution today that helps secure unmanaged privileged accounts in your datacenter and prevent data breaches. Watch how we do it in this brief two minute video.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security, security
    
Lieberman Software
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security
    
Symantec
Published By: Peoplefluent     Published Date: Apr 02, 2013
Todays connected generation is comprised of tech-savvy workers whose strengths must be harnessed for competitive advantage. Read how to reach Gen C and develop talent management strategies to attract, engage and retain this workforce segment.
Tags : 
collaboration, generation c, talent management, mobile, social, social hcm software, talent management software, talent management strategies
    
Peoplefluent
Published By: Salesforce Pardot     Published Date: Sep 09, 2014
Pardot and Salesforce are complementary tools that really reach their full potential when paired together. Not only can these tools improve marketing and sales alignment, they can also provide greater insight into campaign performance, jumpstart lead generation efforts, and positively impact ROI. If youre thinking about integrating these two systems, its important that you understand the benefits this will provide and the steps that will be required for implementation. So, lets get started!
Tags : 
pardot, roi, sales alignment, integration, generation efforts, marketing tool, implementation
    
Salesforce Pardot
Published By: Dell EMC     Published Date: Aug 22, 2017
By 2020 the digital universe the data we create and manage annually will reach 44 zettabytes, or 44 trillion gigabytes! 1 This growth has ushered in a new era of big data, and introduces challenges and opportunities to small and medium businesses trying to economically make sense of it. On the upside, more data means more opportunity for businesses (and consumers) to use data in new ways learning more about customers, speeding business cycles, and improving the efficacy of business workflows
Tags : 
    
Dell EMC
Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats
    
Mimecast
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Datamyx     Published Date: Aug 11, 2016
Heres what you need to know about prescreening with Deluxe Marketing Services. With prescreening, youll be able to identify consumers who match your credit qualifications AND are likely interested in your loan product -- so you can reach out with your best offer. No more wasting campaign dollars on people who are neither qualified nor interested in a loan right now.
Tags : 
deluxe, prescreening, lending, credit, loan
    
Datamyx
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partnersand even intelligent objects like connected cars and monitoring systemsand modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Salesforce     Published Date: May 02, 2016
Learn how to reach your peak sales performance.
Tags : 
salesforce, sales people, productivity, quota, sales performance, productivity habits, enterprise applications
    
Salesforce
Published By: Oracle Commerce Cloud     Published Date: Feb 05, 2016
Are you setting unattainable targets? It seems counter-intuitive, but 95% of Chief Sales Officers (CSOs) reported higher revenue targets and 86% are not very confident they can reach them. With over 25 years in sales 15 of those in sales management and 3 years in executive leadership, Ive seen my share of sales failures and successes. In that time, Ive learned that if you want to be a sales leader who can easily adjust plans and withstand a barrage of obstacles, youll need the support of a knowledgeable sales team, modern best practice processes, and technology. With this holistic approach, you can design the optimal plans and effectively implement them to drive performance. This brief will act as your roadmap with tips about how best to utilize people, processes, and technology to improve your companys sales performance.
Tags : 
    
Oracle Commerce Cloud
Published By: LifeLock     Published Date: May 10, 2016
Unfortunately, many companies don't realize a breach has occurred until it's too late. A world-renowned hospital and healthcare network found this out the hard way when more than 60K+ employee records were compromised. Find out how they minimized loss and quickly restored a sense of confidence after they suffered a data breach
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: May 10, 2016
A data breach can happen at any time. Be ready to respond. Download now and learn the best practices for handling a company data breach. See how you can protect your organization!
Tags : 
    
LifeLock
Published By: illusive networks     Published Date: May 18, 2016
In 2015, the average cost of a data breach was $3.79 million, a 23% increase from 2013. While a data breach of just average magnitude could be enough to cripple numerous companies, there are still organizations failing to take the necessary cyber security precautions.
Tags : 
    
illusive networks
Published By: Oracle ODA     Published Date: Aug 15, 2016
Oracle added two new models to the Oracle Database Appliance family in addition to the existing high availability model. With an entry list price starting at a fourth of the cost of the prior generation Oracle Database Appliance hardware and flexible Oracle Database software licensing, these new models bring Oracle Engineered Systems to within reach of every organization. Read about how the Oracle Database Appliance X-6 series expands the reach of the database appliance family to support various workloads, deployment scenarios, and database editions. They are especially designed for customers requiring only single instance databases, but who desire the simplicity, optimization, and affordability of the Oracle Database Appliance. These new models are ideal for customers who seek to avoid the complexity, tuning requirements, and higher costs of build-your-own database solutions.
Tags : 
    
Oracle ODA
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accountswhether usurped, abused or simply misusedare at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accountswhether usurped, abused or simply misusedare at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accountslike the UNIX and Linux root and Microsoft Windows administratorthis system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depthproviding broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: Evariant     Published Date: Nov 08, 2018
Health systems gain a competitive edge when they identify the right physicians and target those physicians to develop unsurpassed loyalty. Learn how to cultivate relationships with physicians that lead to an increase in cases being referred, which results in smarter provider engagement, increased margins, optimized network utilization and health system growth. But which doctors? In which service lines? And what kinds of cases? And what touch points? This guide discusses how to reimagine how network development teams work that results in the ability to demonstrate indisputable ROI from network development activity and liaison outreach.
Tags : 
physician relationship management, network utilization, market development
    
Evariant
Published By: Micron     Published Date: Oct 13, 2016
Micron is uniquely positioned to ease adoption with extensive expertise, advice and support. Secure your data by preventing data breach due to lost or stolen devices.
Tags : 
    
Micron
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's Leaders quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets dont line up with this risk. Getting the budget for AppSec wont be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
Published By: Juniper Networks     Published Date: Aug 21, 2017
The days are long gone when lone hackers working in bedrooms and garages wrote viruses and broke into computers just for the fun of it. Organized crime syndicates are now monetizing attacks, breaches, and even the tools that hackers need to commit their break-ins.
Tags : 
    
Juniper Networks
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.