trust

Results 576 - 600 of 1031Sort Results By: Published Date | Title | Company Name

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet

Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection, access control, identity management, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
IBM Software

Business case for data protection: A Study of CEOs and other C-level Executives in the US

Published By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : 
ibm ouncelab, data protection, c-level executive us, compliance, roi, performance, privacy, data security, data protection, security management, return on investment, database security
    
IBM Software

Protect the Integrity of the Procurement Function

Published By: SAS     Published Date: Oct 18, 2017
Procurement fraud affects nearly one-third of organizations, and it is often perpetrated by the most trusted, longtime employees, the ones you’d least suspect. Learn from three white-collar crime specialists about common flavors of procurement fraud, striking examples from recent headlines, four fundamental ways to get better at detecting and preventing fraud, and how to take procurement integrity to the next level.
Tags : 
    
SAS

Forrester X-Ray: Build Security Into Your Network's DNA: The Zero Trust Network Architecture

Published By: NetIQ     Published Date: Jan 12, 2011
This report is a deep dive into a potential way in which you could use the concepts of the Zero Trust Model and conceivably implement them in a real-world environment.
Tags : 
netiq, security, network architecture, forrester, auditing, best practices, zero trust model, compliance, encryption
    
NetIQ

Zero Trust with John Kindervag

Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
    
NetIQ

Detecting the Stealthy Attacker: Who Can You Trust? Webcast

Published By: NetIQ     Published Date: Dec 08, 2011
In this webcast IT security expert Matt Mosley will look at traditional detection methods and discuss discuss new alternatives to identify threats.
Tags : 
    
NetIQ

Drivers of Datacenter Growth Part 2: Virtualization and Cloud Computing

Published By: Digital Realty     Published Date: Feb 09, 2011
This paper will explore the interrelationship of data centers and virtualization, discussing the longer term impact virtualization can have on an IT organization and data center utilization.
Tags : 
digital realty trust, datacenter, virtualization, cloud computing, data center utilization, storage virtualization, server virtualization, data center design and management
    
Digital Realty

Drivers of Data Center Growth: Virtualization

Published By: Digital Realty     Published Date: Feb 09, 2011
In this new white paper from Digital Realty Trust you'll see why virtualization software is actually a powerful complementary tool that can increase the efficiency of your existing and future data centers.
Tags : 
digital realty trust, datacenter growth, virtualization, cloud computing, data center utilization, storage virtualization, server virtualization, data center design and management
    
Digital Realty

What is Driving the 2011 US Market?

Published By: Digital Realty     Published Date: Apr 13, 2011
Digital Realty Trust conducts an annual survey of senior executives from enterprise sized companies to capture their perspectives on the industry. This paper provides an overview of the study's major findings.
Tags : 
digital realty trust, enterprise data center, pue, capacity expansion, diy, data center market, infrastructure, data center design and management, virtualization
    
Digital Realty

How SunTrust Bank Wove Event Detection into an Effective Event-based Marketing Program

Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM

Bringing Trust to the Cloud: Strong Authentication for SaaS Applications

Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, security management, application integration, application performance management, vulnerability management
    
VASCO

Adobe Acrobat DC CLP Packs

Published By: CDW     Published Date: Jun 25, 2015
Receive additional savings of up to 17% on top of your current discount level, and get a trusted, hassle-free PDF solution for your organization. Overview of Adobe Acrobat CLP Program.
Tags : 
adobe, cdw, clp pack, content management, collaboration, content management system, cloud computing, data center design and management
    
CDW

Top Reasons Why VNX Unified Hybrid Flash

Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, data management, network management, network performance, storage virtualization, application security, contact management, content delivery, content integration, virtualization, infrastructure
    
CDW

Mobility Services: Do More By Doing Less

Published By: CDW     Published Date: Jun 14, 2016
Mobile devices and apps have transformed the way enterprises operate in recent years, improving productivity, communication and collaboration, and in many cases completely changing how work gets done. To help optimize mobility initiatives, many organizations turn to trusted IT partners that can help maintain mobile deployments and free up staff to focus on innovation.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity, mobile computing, mobile data systems, wireless communications, application integration, contact management, content delivery
    
CDW

Trust the Good, Block the Bad: Optimized Endpoint Security Whitepaper

Published By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam, anti spyware, anti virus, application security, encryption, firewalls, intrusion detection, intrusion prevention
    
McAfee

Rebuilding Customer Trust in Retail Banking

Published By: IBM     Published Date: Jun 20, 2013
The message is simple: Trust has been lost and the digital world is here. Successful relationships with customers in the digital world are high-trust relationships. It is time for bankers to rebuild trust at the same time as developing all the communications and analytical advantages of digital technology. There is no other way. The highly digitalised, non-bank competitors are already taking the best parts of banking. Time is short. Is Apple about to join the fray? Is Amazon? Is Facebook?
Tags : 
customer, trust, banking, retail
    
IBM

2015 IT Communications Buyers Guide: What to Look (out) for from an Enterprise-Grade Solution

Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters

Don't Let Trusted Vendors Become Cyber-Breach Enablers

Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies

Instant-On Cloud Security for Microsoft Azure

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro

Digital transformation in sales: evolving the art of customer engagement eBook (existing)

Published By: Microsoft Azure     Published Date: Apr 10, 2018
For sales organizations, customer engagement is about more than touchpoints—it’s about everything that happens in between personal and digital encounters. Customer engagement requires an organization-wide commitment to creating meaningful connections, building relationships, and nurturing those relationships to establish trust and keep your brand topof-mind.
Tags : 
    
Microsoft Azure

ESG: EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together

Published By: Dell EMC     Published Date: May 29, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
cloud service, applications, workload, big data, software, hardware, portal, business intelligence, data quality, productivity, project management, service management, cloud computing
    
Dell EMC

ESG: EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together

Published By: Dell EMC     Published Date: Jul 27, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
enterprise hybrid cloud, cloud solutions, it solutions, private cloud, hybrid cloud operating model, cloud services
    
Dell EMC

Emotion Takes Over in Tech

Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on “soft” factors to help guide them.
Tags : 
emotion, technology, decision-making, instinct, company culture, reputation, level of trust
    
gyro

How to Engage the Emotions of Your Buyers

Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on “soft” factors to help guide them.
Tags : 
buyers, emotion, company culture, reputation, soft factors, hard factors
    
gyro
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.