social network

Results 51 - 75 of 341Sort Results By: Published Date | Title | Company Name

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

IT 3.0 Manifesto - Finally, IT for the People

Published By: ServiceNow     Published Date: Aug 24, 2011
Read on to discover how modern IT organizations transform to achieve IT 3.0.
Tags : 
collaboration, support, service, business, information technology, enterprise, process, social it
    
ServiceNow

Social IT - Helping People, Promoting Culture and Improving Collaboration

Published By: ServiceNow     Published Date: Aug 24, 2011
This white paper takes a look at the adoption and evolution of social IT within ServiceNow.
Tags : 
social it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it
    
ServiceNow

Powering Transformation

Published By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution
    
ServiceNow

The Future Of Data Security And Privacy: Controlling Big Data

Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security
    
Forrester

Sales Trend Report

Published By: Box     Published Date: Nov 14, 2014
According to the American Community Survey, tele-commuting jumped 79 percent between 2005 and 2012. More than 9 million American workers did their jobs exclusively from home in 2010, according to the U.S. Census, and 30 million work from home at least once a week. And TechCast at George Washington University estimates as many as 30 percent of U.S. private sector workers could be working from home by 2019. For sales professionals, that proportion is certainly higher. The Telework Research Network found in 2011 that 70 percent of those working from home are in management, professional, sales and office jobs. If you’re in sales, you probably spend a considerable amount of time on the go. And why shouldn’t you? Smartphones offer constant, pocket-sized connectivity. Ubiquitous Wifi threatens to render the cubicle obsolete, and the right social networking strategy can sup-plant a hundred individual pitch meetings.
Tags : 
sales, connectivity, smartphones, social networking strategy
    
Box

Build a text analysis app in 3 hours with Word2vec

Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec, enterprise applications
    
IBM

SmartPaper: The next wave of business intelligence for the data-driven enterprise

Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM

Forrester - Graph Vendor Landscape

Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
    
Datastax

The Power of an Active Everywhere Database

Published By: Datastax     Published Date: Apr 08, 2019
We live in the age of “multi”. Everything is becoming more complex, more “intelligent”, and more distributed. Hybrid cloud isn’t really the new frontier—some companies have been operating in a hybrid cloud environment for nearly a decade—the new frontier is learning HOW to take full advantage of hybrid cloud without creating data silos or busting the IT budget. Enterprises are, of course, always looking for ways to make their computer systems faster, more highly available, more fault tolerant, and simpler to scale. But in the age of “multi,” this is becoming harder and harder to do. Imagine running a social network with millions of U.S.-based users and millions of European users. You could host all your servers and data in the United States, but then all of your European users would have a slower experience using your application than their U.S.-based counterparts. You could host all your servers and data in Europe, but then the U.S.-based users would have a slower experience. An obvio
Tags : 
    
Datastax

Tangled Web: Undercover Threats, Invisible Enemies

Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
anti spyware
    
MessageLabs

7 Steps to Controlling Social Networking

Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
MessageLabs

Social Networking: Brave New World

Published By: MessageLabs     Published Date: Sep 25, 2008
According to recent surveys, employee social networking is growing rapidly. Learn the pros and cons of employee social networking, from creating business development opportunities to just goofing off. Also, learn how social networking is raising new challenges for enterprise security, and the distinct advantages of implementing MessageLabs Web Services.
Tags : 
messagelabs, social networking, facebook, myspace, bebo, orkut, perfspot, friendster
    
MessageLabs

Demystifying Web 2.0

Published By: Clearswift     Published Date: Jun 09, 2008
Anyone who spends any time online cannot have failed to notice. People are using the Web in new ways; ways that make the 'brochureware' of the early Web experience look and feel decidedly flat. It's a new world, characterised by a wave of new jargon, brands and web based experiences. MySpace. FaceBook.  Wikipedia. Flickr. Twitter. YouTube. Mashups. Blogs. Newsfeeds. Download this white paper for a simple guide to the terms, opportunities and threats that Web 2.0 poses.
Tags : 
internet security, web 2, web 2.0, clearswift, social media, social networking, facebook, myspace
    
Clearswift

Enterprise Security and Web 2.0: The Impact

Published By: Clearswift     Published Date: Jun 09, 2008
Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.
Tags : 
enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking, network security
    
Clearswift

Ten Ways to Dodge CyberBullets

Published By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : 
eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
ESET

Addressing HIPAA Requirements for Electronic Communications

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance, it management, enterprise applications
    
Actiance, Inc.

Best Practices for Using Electronic Communications In The Public Sector

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication, it management, enterprise applications
    
Actiance, Inc.

Social Media Risks and Benefits for the Pharmaceutical Industry

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements, it management
    
Actiance, Inc.

A Primer: Oracle Intelligent Bots - Powered by Artificial Intelligence

Published By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
    
Oracle

Automation Services Accelerate Customer Transformation While Derisking the Journey (IDC)

Published By: Juniper Networks     Published Date: Aug 08, 2017
Cloud, social, big data, and the Internet of Things (IoT) are increasingly central to business decisions as the pace of digitization accelerates. The impact of software-defined networking (SDN), virtualization, and converged and hyperconverged infrastructure within the datacenter is substantial. These technologies add complexity but offer enticing opportunities for new business models, revenue streams, operating efficiencies, and agility that organizations must pursue if they want to remain competitive and viable. This pursuit requires businesses to keep up with current and emerging technologies and applications and transform the ways in which they conduct business. At the core of "keeping up" is an organization's datacenter strategy — with an associated technology and services strategy that will either create industry laggards or accelerate innovators.
Tags : 
    
Juniper Networks

Finding Tech Talent Using Slack, Reddit and Meetup

Published By: Entelo     Published Date: Sep 06, 2017
Today's tech candidates are actively interacting and sharing their work on different websites, networks, and forums. As more of these channels surface, recruiters have the advantage to connect with more people in real-time, build a community based on shared interests, and to develop their employer identity among candidates. This webinar will cover recruiting on Slack, Reddit, AngelList, and Meetup – a communication tool, aggregated news site and forum, Q&A social network, startup platform, and online portal for interest groups. Michelle Lusen, senior corporate recruiter at Slack, will join us for the webinar to share her best practices for connecting with candidates. In this webinar, you'll learn: How to establish rapport and develop a Slack community of candidates using private and public communication channels Where to look on Reddit and AngelList to find people most interested in hearing about your open role Tactics to identify and engage with domain experts on Meetup How to navi
Tags : 
    
Entelo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.