employees

Results 101 - 125 of 1800Sort Results By: Published Date | Title | Company Name

The Practical Executive's Guide to Data Loss Prevention

Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint

Rethinking Data Security with a Risk-Adaptive Approach

Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint

Next Gen Your Data Protection

Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint

A Guide to Achieving SaaS Security and Compliance

Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint

Is Your Current Network Costing You Time and Money?

Published By: Forcepoint     Published Date: Jun 06, 2019
When it comes to connecting remote offices and employees, traditional distributed networks can't handle the new wave of cloud-based applications that are driving increasing speed and innovation across the enterprise. If you want to make sure that your network resources are being used more efficiently, this eBook will show you how using direct-to-cloud connectivity and scaling site-to-site with on-demand VPNs can reduce downtime and decrease complexity—ultimately saving you money.
Tags : 
    
Forcepoint

Briefing: The Future of IT – Building a flexible IT workforce

Published By: KPMG     Published Date: Jun 06, 2019
In future, people with IT skills will no longer work only within the IT function. Instead, they’ll be part of an ecosystem of technology talent across the enterprise. How should CIOs respond to this change? Read this briefing to find out: • what the changing status of technology means for the IT workforce • how CIOs can encourage employees to be IT enablers rather than IT ‘doers’ • why we need to rethink IT as a technology talent ecosystem • why IT should no longer be the gatekeeper to technology – and what it needs to become instead.
Tags : 
    
KPMG

Transformation story: Transform IT service management with confidence

Published By: KPMG     Published Date: Jun 06, 2019
Advanced service management platforms help reduce costs, enhance ITSM performance and give employees access to the IT they need. Find out how we helped a global law firm implement a state-of-the-art ServiceNow platform. Read this story to understand: • what benefits advanced ITSM platforms can deliver • how to decide on your preferred platform • how to ensure a fast, efficient, low-risk implementation • five key principles to guide your transformation.
Tags : 
    
KPMG

Customer Centricity and the CHRO

Published By: KPMG     Published Date: Jun 06, 2019
Leading companies are focused on increasing customer satisfaction and retention by taking an organisation-wide, customer-centric approach. Find out about the critical role HR has to play in elevating the customer experience. Read this report to discover: • how HR can influence the customer agenda • how to take advantage of AI and D&A to recruit the right people • what skills customer service employees will need as a result of automation • how to win senior buy-in for new HR policies and approaches • seven action steps for building a customer-centric culture.
Tags : 
    
KPMG

Staying ahead of the business bandwidth curve

Published By: Spectrum Enterprise     Published Date: Jun 05, 2019
The success of every business is driven by the quality of its connections, whether with clients, employees, investors, suppliers, manufacturers or other key stakeholders. Increasingly, these relationships are measured through data-driven analytics, enhanced through video communication, and empowered through cloud computing and collaboration. As the volume of data grows, so do bandwidth requirements.
Tags : 
    
Spectrum Enterprise

What Does Your Space Say About Your Business?

Published By: Staples     Published Date: Jun 04, 2019
Less than 20% of employees feel their workspace is “well designed” for employee needs. Watch this short video to learn how you can develop a workplace strategy that fits your unique organization.
Tags : 
it management, human resource technology, it career advancement, electronics, business technology
    
Staples

Key considerations for delivering secure unparalleled remote access

Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems

How to drive productivity in today's cloud first world

Published By: Citrix Systems     Published Date: Jun 04, 2019
Learn how a digital workspace can help you: Deliver the apps and data people need to be productive Improve performance with unified analytics Unify access to apps across hybrid environments Get this e-book that explains how a digital workspace can simplify IT while delivering the experience your employees expect.
Tags : 
    
Citrix Systems

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Published By: Citrix Systems     Published Date: Jun 04, 2019
In this white paper you’ll learn how Citrix Workspace can help your workforce become more productive while improving manageability and security, including how you can: Simplify adoption in any type of cloud environment Reduce risk wherever and however people access Office 365 Give employees a great experience for every app they use
Tags : 
    
Citrix Systems

Measuring the confidence of IT leaders in their data and security practices

Published By: Oracle     Published Date: Jun 04, 2019
The results presented in this report are based on a mobile-only, 23-question global survey. This survey targeted Manager, Director, Vice President or C-Level executives with influence in the decision-making process of cloud solutions, platforms, and infrastructure or department specific software. Respondents worked within organisations generating revenues between less than £1 million to more than £500 million, with 100 to 50,000 employees. Who believes they are truly capable of managing this deluge of data? To find out download this survey today!
Tags : 
    
Oracle

PwC’s Connected Solutions

Published By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldn’t it be your company’s? Learn more in this report.
Tags : 
    
PwC

Three items to consider when choosing a fiber Internet provider

Published By: Spectrum Enterprise     Published Date: May 28, 2019
The right fiber Internet provider can significantly improve the service you provide to employees, partners and clients. For the best outcome, carefully vet providers based on the following top three criteria:
Tags : 
    
Spectrum Enterprise

Liberty Mutual Insurance Helping employees save money and make informed decisions about managing the

Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
Liberty Mutual Insurance offers personal and commercial insurance to policyholders around the world. With more than 50,000 employees located in more than 60 countries, managing the corporate benefits program is a tremendous task. Matthew Vlieger, Manager of Finance and Analytics in the company’s Corporate Benefits Division, is responsible for analyzing member engagement within the various health plan offerings. He also provides insights to the strategy directors to help them identify areas for improvement.
Tags : 
    
Group M_IBM Q2'19

The Ohio State University Health Plan Using IBM Outpatient Event Grouper to help develop innovative

Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
The Ohio State University Health Plan manages healthcare insurance benefits and wellness resources for the university’s 29,000 employees, as well as their spouses and dependents. The Ohio State University is one of the nation’s top 20 public universities, and its Wexner Medical Center ranked #3 among 104 academic medical centers that were included in the 2014 University Health System Consortium Quality and Accountability Study. The health plan, medical center and university work together to help deliver safe, efficient, patient centered care to its members.
Tags : 
    
Group M_IBM Q2'19

eBook : SAP on Azure

Published By: Rackspace     Published Date: May 28, 2019
Today, it isn’t a matter of if you’re taking SAP to the cloud – but a matter of when, and how you’re going to make it happen. Because by moving your SAP workloads to the cloud, you are putting them together with other data streams, advanced analytics and machine learning, to create a powerful combination to better engage customers, empower employees, optimize operations and transform products. This e-book introduces Rackspace as the managed cloud service provider to partner, for moving SAP workloads to Azure. Being certified in all the leading SAP technologies, including hosting services, HANA Operations and HANA Enterprise Cloud (HEC) – and having been awarded Microsoft Hosting Partner of the Year five times – Rackspace has got the whole SAP on Azure solution covered, from planning to deployment and ongoing management. Check out the case studies of global companies, like Rockwell Automation, The Mosaic Company, Malaysia Airlines and Coats & Clark, to discover how they have benefi
Tags : 
    
Rackspace

How Web To Print Can Pay For Itself (In as Little as 6 Months)

Published By: Canon Solutions America     Published Date: May 24, 2019
According to a recent study, a web-to-print solution can potentially deliver a 100% payback in six months based on the workload of 2.5 employees. If you’re still on the fence about deploying web to print in your business, this guide is a must-read.
Tags : 
    
Canon Solutions America

Effective Security for the Multicloud Era

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere.
Tags : 
    
Cisco Umbrella EMEA

How to grow insurance revenue, reduce risk and ensure compliance by going digital

Published By: Equinix EMEA     Published Date: May 22, 2019
This playbook outlines how insurance companies can evolve their business architectures to meet user demand, reduce risk and comply with regulations. Insurers’ employees, partners and customers are increasingly interacting at the digital edge, where commerce, population centers and digital ecosystems intersect. A distributed interconnection platform at the digital edge allows insurance companies and ecosystem participants to accelerate their transformation and effectively compete with increasingly nimble challengers.
Tags : 
    
Equinix EMEA

It's Time to Rethink Data Security

Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint

Get Insightful Guidance on Implementing DLP

Published By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint

Understanding the Impact of Comprehensive Data Security

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.