resilience

Results 101 - 124 of 124Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what theyre doing to combat them. Most importantly, youll walk away with actionable steps to improve your organizations email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
    
Mimecast
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management, as/400
    
Vision Solutions
Published By: Group M_IBM Q418     Published Date: Nov 01, 2018
The Ponemon Institute and IBM Resilient are pleased to release the findings of the third annual study on the importance of cyber resilience for a strong security posture. The key takeaway from this years research is that organizations globally continue to struggle with responding to cybersecurity incidents. Lack of formal incident response plans and insufficient budgets were reported as the main causes of this challenge.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilients latest report, The Ponemon Institute Study on the Cyber Resilient Organization. Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: MeQuilibrium     Published Date: Jul 31, 2019
More people suffer from anxiety than ever before, and its deeply affecting companies like yours. Many organizations are stuck wondering what to do. In this white paper, The Triple A Threat, we explore the Triple A Threat of anxiety, anger, and aggression. Well explain what impact these issues have on your workplace and your bottom line. Youll also learn: ? The debilitating impacts of anxiety, which can lead to workplace anger and aggression ? Why resilient employees suffer less anxiety and can rebound after a setback ? How to build a habituated, protective shield through proven prevention techniques Resilience can equip your people with the skills to address stress and the challenges that work presents every day. With more resilient employees, organizations can dramatically reduce the threats of anxiety, anger, and aggression. Download Now
Tags : 
    
MeQuilibrium
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that mattersdata that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isnt part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Symantec     Published Date: Nov 19, 2014
The top ten tips on how to secure your business against cyber risk and threats.
Tags : 
tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
Symantec
Published By: IBM     Published Date: Oct 10, 2013
In the past, server, storage and data center redundancy were the only options that met corporate resilience objectives. Read this white paper to gain an understanding of the resiliency challenges facing organizations today and how you can transition to cloud-based resiliency.
Tags : 
continuity, business continuity, cloud computing, cloud-based resilience, resiliency, business resiliency, recovery, recovery time
    
IBM
Published By: Workday UK     Published Date: Jan 31, 2019
Data privacy and cyber security are now a larger risk and priority for businesses than ever before. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK
Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
Published By: IBM     Published Date: Jun 16, 2015
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity, compliance, disaster recovery, internet security, security management, wireless communications, wireless security, best practices, server virtualization, data protection, database security
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud hosting, ibm, integration, cloud computing, data centers, application integration, best practices, business analytics, content integration, content management system
    
IBM
Published By: IBM     Published Date: Jan 23, 2013
The paper examines key factors you should consider when planning for the transition to cloud-based business resilience and in selecting your cloud partner.
Tags : 
disaster recovery, cloud computing, cloud, virtualization, data protection, business continuity, backup and recovery, storage virtualization, encryption
    
IBM
Published By: IBM     Published Date: Jun 26, 2013
Protect your applications quickly with a resilient cloud.
Tags : 
disaster recovery, cloud computing, resilience
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Disaster recovery has become a necessary component of organizations' IT plans, but that flat IT budget makes it harder and harder to protect critical business applications. Read this white paper to learn how cloud-based business resilience can provide cost-effective alternatives to traditional disaster recovery.
Tags : 
disaster recovery, cloud computing, ibm, backup, smartcloud virtualized server recovery, vulnerability management, virtualization
    
IBM
Published By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: The damaging effects of ransomware, spear-phishing and impersonation attacks What defensive strategies and technologies you should employ Why your current Symantec Email Security solution may not be up to the task How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Workday     Published Date: Feb 01, 2019
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: Feb 01, 2019
Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday APAC     Published Date: Dec 18, 2018
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
    
Workday APAC
Published By: IBM APAC     Published Date: Jun 24, 2019
Every organization strives for more cyber resilience. The Ponemon Institutes fourth annual study on The Cyber Resilient Organization uncovered that there is a set of habits or practices that the most cyber resilient organizations undertake to achieve greater states of cyber resilience. Download this report to review the key findings; including: The impact of the skills gap How complexity can be the enemy of cyber resilience Lessons learned from high achieving cyber resilient organisations The importance of incorporating the privacy function in your strategy. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
Download these case studies to learn how Whil was able to increase employee satisfaction and decrease employee turnover by introducing mindfulness in the below organizations: Global fashion retailer City government Technology University Leading non-profit Production company Global advertising agency
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
Published By: MeQuilibrium     Published Date: Jul 25, 2018
In todays competitive work environment, attracting and retaining top talent is paramount and expensive. Companies recruit high performing employees with deep experience, invest in training, and reward outcomes. Yet while talent and experience are critical, new evidence suggests those attributes may not be enough. Its not simply how well a person can perform in a typical situation, but how quickly they can return to high performance after an inevitable setback. Resilience is the ability to become strong, healthy or successful again after something bad happens. It includes (learnable) cognitive and emotional skills that reduce the degree and duration of episodes of discouragement, reluctance or defeat that often follow negative events. A resilient worker will quickly put the event in perspective and search for alternative solutions while their less-resilient colleagues experience a letdown or assign blame. This paper describes how resilience, measured by the meQ Score, corresponds to w
Tags : 
    
MeQuilibrium
Start   Previous    1 2 3 4 5     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.