information

Results 1 - 25 of 3505Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle     Published Date: Sep 26, 2019
It’s no secret that data-driven marketing (DDM) is top of mind for brand and agency executives. But what is surprising—shocking, in fact—is how vital first- and third-party information is for creative and execution strategies today. Case in point: 70% of senior marketing executives from brands, agencies and related industry segments say data-driven marketing is a core element of a majority of their campaigns, according to a new Oracle-Forbes Insights survey. This full immersion in data and analytics—more than what many industry insiders may have realized—shows how quickly brands and agencies have recognized the potential benefits and rushed to replace outdated “gutfeel” decision making with quantifiable research. This was another recurring theme in the Oracle-Forbes Insights study, which found that marketing executives rely on advanced analytics to increase sales, attract new customers and expand brand awareness. In addition, 71% of respondents feel they effectively use it to identify
Tags : 
    
Oracle
Published By: IBM     Published Date: Feb 26, 2016
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, watson explorer, analytics, data, enterprise software, application integration, application performance management, business activity monitoring, business analytics, business integration, business intelligence, business management
    
IBM
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
    
Seamless
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Workday     Published Date: Mar 02, 2018
Collaboration can sometimes result in conflagration, the ignition of opposing designs, or competing ideas shouted to closed minds. But a unique consortium of colleges and universities nationwide are working in diligent concert with Workday, a designer of cloud-based software, to develop the first student information system built entirely in the 21st century.
Tags : 
collaboration, cloud-based software, student information system
    
Workday
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity, file security, file movement, managed file transfer, mft, information management, collaboration
    
Ipswitch
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance, access control, security management, security policies, vulnerability management
    
Brainloop
Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization, cloud, cloud computing, infrastructure, network performance, network performance management, wide area networks, application performance management, performance testing, software compliance
    
Riverbed
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management, data center
    
Tripwire
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2
Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: Ipswitch     Published Date: Mar 14, 2014
This just-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of why legacy file transfer systems are no longer adequate in the face of today’s skyrocketing user demands. Specifically, the e-Guide exposes the limitations of “business as usual” file transfer solutions such as FTP and e-mail, and looks at an innovative solution that can make the IT professional’s job much easier
Tags : 
ipswitch, file transfer, file location, file transfer system, automation, integration, centralization, file transfer solution, managed file transfer, mft, file movement, file security, collaboration, information management, document management, records management, secure content management, productivity
    
Ipswitch
Published By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : 
cleo, mft, mft technology, file transfer, b2b integration, enterprise applications
    
Cleo
Published By: Focus     Published Date: May 13, 2009
A network upgrade is necessary; however, you need everyone to agree. Get the help to sell it. Download your FREE research report now.
Tags : 
information technology, networking, infrastructure, internetworking hardware, it spending, total cost of ownership
    
Focus
Published By: Seismic     Published Date: May 14, 2019
Imagine being able to walk into a meeting and say, “this is what our content has done to accelerate deals, the amount of revenue it has affected, and the ROI of our overall content strategy.” Every marketer dreams about proving ROI and the Information Age has finally made it possible for marketing teams to get concrete numbers on the success of various campaigns. But with all the data out there, how do marketers know which KPIs provide the best insight into the health and success of their marketing activities? Download the guide to learn: ? The top KPIs for improving internal marketing efficiency ? The content engagement analytics that prove value ? How to have better visibility into what content sales uses most often
Tags : 
    
Seismic
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.