ar best practices

Results 476 - 500 of 1165Sort Results By: Published Date | Title | Company Name

IDC Infobrief: 5 Lessons Learned from Transitioning to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint

IDC Infobrief: 5 Lessons Learned from Transitioning to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint

The Practical Executive's Guide to Data Loss Prevention

Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint

5 Best Practices for Application Security: A How-To Guide

Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable

Social Strategies for Retail

Published By: Sprinklr     Published Date: Mar 13, 2018
"Retail depends on social. Social depends on you. Learn best practices for building a better retail experience through social. To help kick-start your planning, we've gathered our most popular retail content in ""Social Strategies for Retail."""
Tags : 
    
Sprinklr

Security at the Speed of DevOps

Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike® Falcon Discover™on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. You’ll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA

The Artemis Guide to Cutting Benefits Costs (Without Cutting Programs)

Published By: Artemis Health     Published Date: Feb 05, 2019
Self-insured employers want to cut costs without affecting the quality of coverage available to employees. HR leaders need to provide great benefits that attract talent, but they also need to slow the rising tide of healthcare costs at the same time. In this whitepaper, you’ll see three examples of how benefit teams have cut benefits spending without cutting benefit programs. • The potential savings available with telemedicine programs • The surprising ROI of fertility coverage and care • Best practices for evaluating and implementing onsite clinics
Tags : 
    
Artemis Health

How Benefits Data Becomes Actionable

Published By: Artemis Health     Published Date: Feb 05, 2019
Self-insured employers are mining their health and benefits data to save costs and provide quality care for employees. Data is driving business decisions, but how do you get from millions of rows of data to a consumable graph to taking action? In this white paper, we’ll delve into data analytics best practices that help self-insured employers find actionable insights in their benefits data. • Which data sources will help you ensure you’re measuring the right thing at the right time • How to ensure data variety and choose key metrics • An example of a successful predictive analysis using benefits data
Tags : 
    
Artemis Health

Why Brokers & Consultants Are Choosing Benefits Data to Better Serve Their Clients

Published By: Artemis Health     Published Date: Aug 08, 2019
The benefits landscape is constantly shifting, and it’s hard for brokers and consultants to keep up with the latest best practices. The key to making great recommendations? Great data. In this whitepaper, you’ll discover: • How a data solution can offer actionable insights in just 1 hour a week • The advantages of a data platform for serving the entire book of business • How more brokers and consultants acknowledge data as a competitive advantage
Tags : 
    
Artemis Health

AWS Well-Architected Framework

Published By: Jelecos     Published Date: Feb 11, 2019
The AWS Well-Architected framework has been developed to help cloud architects utilize best practices to build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for Jelecos and its customers to evaluate architectures and provides guidance to help implement designs that will scale with your application needs over time.
Tags : 
    
Jelecos

Breakthrough Security and Compliance Practices for the Digital Enterprise

Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN

Digital Engagement in the Contact Center

Published By: Gameffective     Published Date: Feb 26, 2019
How to drive employee motivation and learning with gamification and feedback Digital engagement provides an exciting new way of breaking away from old paradigms to generate motivation, proficiency and engagement. In this white paper we will: * Provide ways to rethink call center agent motivation by using techniques like feedback, competition, adaptive learning and goals. * Take a look at what digital motivation looks like in the contact center from the point of view of a call center agent and his manager Using gamification can do much more than drive quality and performance. It also provides agents with much needed engagement, transparency, feedback and optimal use of best practices training.
Tags : 
    
Gameffective

Multi-Site and Campus-Area Wirelss LANs: Benefits of the Centralized Approached

Published By: Brocade     Published Date: Sep 07, 2010
This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.
Tags : 
wlan, wireless lan, wireless network performance, wireless network security, wlan security, higher education, healthcare, network performance
    
Brocade

API Strategy & Architecture eBook

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
    
CA Technologies EMEA

7 Proven Practices to Strengthen Release Management

Published By: IBM     Published Date: Oct 02, 2015
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
ibm, release management, business needs, market trends, customer demands, deploy application, best practices, it management
    
IBM

Unified Data Protections for Physical and Virtual Environments

Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security, storage virtualization, data protection, virtualization
    
Symantec

Modernizing Data Protection With Backup Appliances

Published By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, data protection, database security, virtualization
    
Symantec

Getting Started with Amazon Redshift – Best Practices

Published By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
    
Amazon Web Services

Setting The Stage For The Best Practices Service Performance

Published By: ClickExpress     Published Date: May 01, 2013
The path forward is clear: the best practices organizations have already taken the first steps to establish a stronghold with the application of Mobile Workforce Management Solutions. They are already at the vanguard of technology adoption, implementation, and usage. However, as the global services economy continues to expand, all services organizations that expect to compete successfully in their respective market space will need to embrace the state-of-the-art technologies that will allow them to survive – and thrive – in an increasingly competitive marketplace.
Tags : 
stage, practice, service, performance, organizations, management solutions, implementation
    
ClickExpress

The Role of Mobile Workforce Management Technology

Published By: ClickExpress     Published Date: May 01, 2013
Mobile Workforce Management solutions enable companies to deliver superior field service and customer satisfaction (see Part I, Setting The Stage For Best Practices Service Performance). However, a successful Mobile Workforce Management transformation is dependent upon many factors beyond simply deploying new technology. It requires a full understanding of the overall business objectives, a keen understanding of historical processes, a standard system of key performance metrics along with the organization’s current performance in those metrics, and effective communication to ensure organizational readiness and project execution.
Tags : 
mobile, management, workforce, technology, solutions, field service, customer satisfaction, management
    
ClickExpress

Key Ways to Optimize your Email Campaign ROI

Published By: Return Path     Published Date: Jan 29, 2013
Email marketing is always changing. Download the “Email Intelligence Report” to tap into the latest data trends and analytics to optimize your email campaigns and ROI.
Tags : 
email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends
    
Return Path

9 Reasons Why Your Email Campaign Is Failing

Published By: Return Path     Published Date: Jan 29, 2013
Measuring your data can be difficult, but knowing what to do next is even harder. Identify issues quickly with the “Email Metrics Troubleshooter” checklist, so you can focus less time on identifying problems and more time on reaching your goals.
Tags : 
email failure, high unsubscribe rate, low click-through rate, drop in open rate, low response rate, rise in traffic but not in conversion, email trends, email marketing trends
    
Return Path

Email Marketing Hot Topics: Things You Should Know About Mobile Email

Published By: Return Path     Published Date: Jan 31, 2013
Email marketing isn’t simple anymore. The “Email Best Practices for Mobile” podcast provides best practices and tips for marketers designing email content for both mobile and desktop viewing.
Tags : 
email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends
    
Return Path

Webcast: iPads and iPhones Go to Work: The Essential Guide for IT Support

Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Web Application Threats are Evolving. Are Your Security Efforts Keeping Pace? Today, Web

Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.