trust

Results 51 - 75 of 1000Sort Results By: Published Date | Title | Company Name

Forrester Consulting: Delivering Governed Data For Analytics At Scale

Published By: Pentaho     Published Date: Nov 04, 2015
Amid unprecedented data growth, how are businesses optimizing their data environments to ensure data governance while creating analytic value? How do they ensure the delivery of trusted and governed data as they integrate data from a variety of sources? If providing appropriately governed data across all your data sources is a concern, or if the delivery of consistent, accurate, and trusted analytic insights with the best blended data is important to you, then don’t miss “Delivering Governed Data For Analytics At Scale,” an August 2015 commissioned study conducted by Forrester Consulting on behalf of Pentaho.
Tags : 
pentaho, analytics, platforms, big data, predictive analytics, data management, networking, it management, storage, business technology, data center
    
Pentaho

The 5 Step Guide to Successful Language Training:

Published By: Rosetta Stone     Published Date: Jan 23, 2018
With global opportunities on the rise,. having a multilingual workforce has become a critical market success factor. Language proficiency and awareness of a market's culture, local customs, and business traditions conveys respect for customers and colleagues, which leads to greater trust and improved business results. Businesses are providing language-learning resources that prepare employees to engage in these markets. Forbes Insights and Rosetta Stone surveyed 200+ executives globally to understand the impact of language training on companies and employees. Read this guide to learn the key themes and data from the report.
Tags : 
    
Rosetta Stone

The myths and realities of digital workspaces

Published By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
    
Cisco Spark

Is Your Competition Killing You with Personalization?

Published By: DataStax     Published Date: Mar 10, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
    
DataStax

Money Matters: The Digital Enrollment Imperative

Published By: Adobe     Published Date: Nov 09, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: How leaders in finance do it right Increasing engagement with mobile-optimized forms and signatures Ensuring enrollment is compliant and builds trust
Tags : 
    
Adobe

Tech WP: Rethink NW Security Deployment

Published By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
    
Gigamon

Gartner CARTA

Published By: Gigamon     Published Date: Oct 25, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon

Intelligent Automation for Brand Trust and Transparency

Published By: Infosys     Published Date: May 30, 2018
Customers today are far more concerned about the contents and origin of a product than ever before. in such a scenario, granting them easy access to product information, via digital initiatives such as SmartLabel™, goes a long way in strengthening customer trust in a brand. But it also means expending several man-hours of effort processing unstructured data, with the possibility of human error. Intelligent automation can help save effort and time, with virtually error-free results. A consumer products conglomerate wanted a smart solution to implement SmartLabel™ compliance. See how Infosys helped and the five key takeaways from the project.
Tags : 
automation, brand, information, digital, customer
    
Infosys

Faster Mainframes for Speed Trading

Published By: Infosys     Published Date: May 30, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : 
mainframes, speed, trading, system, modernize
    
Infosys

Data Protection Suite Better Together

Published By: Dell PC Lifecycle     Published Date: Aug 09, 2018
For total peace of mind, trust your Data Protection to a vendor with a complete solution. Get the most out of Dell EMC Data Domain by leveraging the power of the Data Protection Suite Family .
Tags : 
    
Dell PC Lifecycle

The Definitive Guide To Public Cloud Security and Compliance for Financial Services

Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9

Where does AI fit within HR?

Published By: Oracle     Published Date: Mar 04, 2019
Watch this webinar to understand exactly where AI fits within HR. Euan Semple, speaker, writer and consultant, describes how you could apply AI and ML within HR to drive meaningful change.But before that can happen, teams need to trust the technologies they’re using.
Tags : 
    
Oracle

How Non-profit Organizations Can Achieve Transparency and Accountability

Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
nonprofit, ngo, erp, financial transparency, accountability, social impact
    
Unit4

How Non-profit Organizations Can Achieve Transparency and Accountability

Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
    
Unit4

eBook: Is 3D Scanning Right for Your Inspection Needs?

Published By: 3D Systems     Published Date: Feb 28, 2019
Combining the right people, hardware, and software to ensure quality everywhere Quality and reliability matter more than ever. In today’s hypercompetitive environment, companies can’t afford to lag behind when it comes to the quality of their products. And management can’t lag behind when it comes to adopting new tools and technologies to ensure quality everywhere. Over the past two decades, 3D scanning has become a crucial tool in many manufacturers’ measurement and inspection arsenals. It’s an effective metrology technique that is trusted for its accuracy, reliability, speed, and ease of use. Its noncontact nature and exceptional flexibility make it ideal for measuring a wide range of parts in a wide range of places. An effective approach to 3D scanning requires matching the right people with the right hardware and the right software to best meet your company’s measurement needs. This eBook will help you determine if 3D scanning is right for your inspection needs, and if it is, how b
Tags : 
    
3D Systems

Building trust in your information and security

Published By: Oracle EMEA     Published Date: Jul 22, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle EMEA

Remote Access and Security Challenges & Opportunities

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies

Protecting Your Network from Malware

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk

Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies

Enforce a Zero Trust Security Model in Today's Hostile Environment

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
    
Akamai Technologies

8 Steps to Zero Trust

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.
Tags : 
    
Akamai Technologies

The 4 Benefits of VPN Elimination

Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies

Zero Trust Delivers 6 Security and Business Benefits

Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.