pto

Results 351 - 375 of 439Sort Results By: Published Date | Title | Company Name

TEAR DOWN THE WALLS HOLDING BACK YOUR OMNICHANNEL MARKETING SUCCESS

Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Everybody in marketing is chasing today’s consumers as they hop from channel to channel on their digitally empowered customer journeys. Some marketers are more successful than others. Brands with integrated omnichannel touchpoints can let customers start researching a product on their laptop, receive related advertising on social, ask questions on chat, make the purchase on their phone, and pick up the product at their nearest store.
Tags : 
    
Selligent Marketing Cloud

5 Trends Redefining Fraud

Published By: Sift     Published Date: Jul 12, 2019
"What trends should you be following for the next 6 months? We’ve pored over the data, sorted through the news, and interviewed experts and (former) fraudsters. Whether you’re planning for the next month, quarter, or year, this ebook can be your guide. READ THIS GUIDE TO FIND OUT: How fraudsters are using technology against us Whether cryptocurrencies are driving fraud or helping to stop it What GDPR tells us about the future of regulation Why content abuse is getting harder to fight How businesses balance user experience with protecting user data "
Tags : 
    
Sift

Paypal, the original disruptor, shares its story of continuous innovation

Published By: Singapore Economic Development Board     Published Date: Nov 14, 2018
Online payments giant Paypal drives global innovation with a forward-looking perspective, ‘fail-fast’ structure and customer-centricity. It shares how Singapore’s strong research institutions, fast-growing tech startup scene, and good talent is enabling its innovation priorities.
Tags : 
    
Singapore Economic Development Board

How to Stay Protected Against Ransomware

Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos

Analyst Report: Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017

Published By: Splunk     Published Date: Nov 29, 2018
Gartner Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017 Splunk Jumps From #5 in 2016 to #2 in Top 10 Named ITOM Performance Analysis Software Vendors, Worldwide, 2017 Splunk is ranked #2 of overall ITOM Performance Analysis Software Vendors, according to Gartner’s report, Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017. This Gartner report also lists Splunk as one of several disruptors in the table “Market Share of Incumbents vs. Disruptors - ITOM Performance Analysis Software.” As a Splunk customer, are you utilizing your machine data platform to its fullest potential? Learn about newest trends in ITOM software tools across AIOps, APM, infrastructure monitoring and Network performance monitoring and diagnostics. Download this report to learn: 2017 rankings of performance analysis software vendors, overall and subsegments How digital business is driving demand for modern, agile monitoring tools via DevOps toolchains Shifts in
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk

Care Is The New Marketing

Published By: Sprinklr     Published Date: Feb 28, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
social customer care, customer care, customer care program, customer service, social customer service, social media customer service, social media, social, program, plan, sprinklr
    
Sprinklr

Care Is The New Marketing

Published By: Sprinklr     Published Date: Mar 13, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
    
Sprinklr

Compliance in the Mobile Enterprise

Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase, wireless, policy based management, security policies, mobile computing, mobile workers, wireless application software, wireless communications, wireless messaging
    
Sybase

Best Practices and Applications of TLS/SSL

Published By: Symantec     Published Date: Jun 28, 2012
Transport Layer Security or TLS widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world.
Tags : 
transport layer security, tls, secure soclets layover, ssl
    
Symantec

Best Practices and Applications of TLS-SSL

Published By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : 
tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, networking, security, data management, business technology
    
Symantec

The Heartbleed Bug: How To Protect Your Business with Symantec

Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec

Endpoint Security for the Enterprise

Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec

Advanced Endpoint Security for Dummies

Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec

Best Practices and Applications of TLS/SSL

Published By: Symantec Corporation     Published Date: Oct 03, 2013
White Paper Published By: Symantec Corporation Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing Web browser sessions, but it has widespread application to other tasks.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Website Security in Corporate America

Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Distributed workforce management in the cloud: Spreading IT security wherever employees roam.

Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device, distributed computing, infrastructure, network security, remote access, remote network management, mobile computing, mobile data systems, mobile workers, pda, smart phones, wireless communications
    
Symantec.cloud

Power and Signal

Published By: TE Connectivity     Published Date: Apr 13, 2018
Whether you’re designing to efficiently charge-up a laptop, distribute power from a battery pack, keep signals uninterrupted in industrial machinery or a thousand other products, TE Connectivity offers reliable solutions that bring power & signal to your applications. TE Connectivity’s (TE) extensive connector and sensor solutions provide the essential connectivity you need for your daily interactions at home and in the workplace. Whether you are looking to design next generation display panels and internal LED lighting or you’re designing-in for the latest door alarms and pressure sensors, TE has the essential products you need for always-on connectivity.
Tags : 
power, signal, connect, solutions, display, workplace, industrial
    
TE Connectivity

Server-Gated Cryptography

Published By: thawte     Published Date: Aug 27, 2008
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
thawte, ssl, encryption, internet security
    
thawte

Server-Gated Cryptography: providing better security for more users

Published By: Thawte     Published Date: Aug 08, 2013
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, networking, security, data management, business technology
    
Thawte

History of Cryptography

Published By: Thawte     Published Date: Dec 29, 2015
This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Tags : 
cryptography, encryption, security, business continuity, ssl, web service security, infrastructure
    
Thawte

Beating Benefit Bewilderment: Why Your Employees Are Confused & What You Can Do About It

Published By: The Jellyvision Lab     Published Date: Apr 13, 2010
Do you feel overwhelmed when communicating benefits to employees? Any increase in headaches? Nausea? Sudden rise in blood pressure? Well, those symptoms often point to a general condition known as: Benefit Bewilderment. There are a number of possible causes for this condition. Let's see which apply to you and discuss possible treatments so you can work that HR mojo on your many other responsibilities.
Tags : 
jellyvision, benefit management, benefits, employee management, enrollment
    
The Jellyvision Lab

Top Strategies to Deploy Mobility in the Public Sector

Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing, laptops, communications, ip networks, ip telephony, network security, smart phones, wireless communications, wireless infrastructure, wireless phones, wireless security, collaboration, secure content management
    
TheMarketingScope

The Algorithmic Insurer - How AI and Machine Learning is Transforming the Insurance Industry

Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software

Blockchain & Manufacturing

Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software

Blockchain y fabricación

Published By: TIBCO Software     Published Date: Sep 16, 2019
Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado. Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye: • Blockchains empresariales • Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.