trust

Results 251 - 275 of 1029Sort Results By: Published Date | Title | Company Name

Deploying Office 365 and Other Cloud Applications with a Cloud-based Authentication Solution

Published By: Entrust Datacard     Published Date: Mar 20, 2017
Microsoft® Office 365™ continues to lengthen its lead as the world’s top enterprise cloud service. Nearly one-in-four employees in Fortune 500 companies are active on Office 365 — and more than 90% of those large enterprises currently have more than 100 active users. Users are clearly becoming more reliant on Office 365, as usage grew at a rate of more than 300% in 2016.
Tags : 
    
Entrust Datacard

Deploying Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution

Published By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
    
Entrust Datacard

Depository Trust & Clearing Corporation Keeps Up with Growth and Keeps the Markets on Firm Ground

Published By: IBM     Published Date: Mar 28, 2008
The dominant provider of investment processing services in the U.S., DTCC sought to parlay its record of service innovation and cost leadership by expanding globally. DTCC teamed with IBM to re-architect its core processing infrastructure to enable it to push its already world-leading transaction capabilities even further to accommodate DTCC's global growth vision.
Tags : 
infrastructure
    
IBM

Detecting the Stealthy Attacker: Who Can You Trust? Webcast

Published By: NetIQ     Published Date: Dec 08, 2011
In this webcast IT security expert Matt Mosley will look at traditional detection methods and discuss discuss new alternatives to identify threats.
Tags : 
    
NetIQ

Developing a data integration and lifecycle management strategy for a hybrid environment

Published By: IBM     Published Date: Jul 06, 2016
How can your organization realize the financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? The answer is governance. Download to read more.
Tags : 
ibm, big data, trusted data, data management, data solutions, data center
    
IBM

Device Certificates: Identity Authentication in a Mobile World

Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard

Device Certificates: Identity Authentication in a Mobile World

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology, security
    
Entrust Datacard

DEVOPS AND SECURITY: TOO LITTLE, TOO LATE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard

DevOps Mythbusting

Published By: Puppet     Published Date: Mar 09, 2017
There’s a lot of misinformation about DevOps out there — causing some organizations to mistrust the benefits of DevOps practices. It’s time to debunk the common myths, and get on a path to collaborating more effectively and delivering better software, faster. Download the ebook to disprove these common DevOps myths: • Myth 1: There’s no direct customer/business value for adopting DevOps. • Myth 2: There’s no significant ROI in applying DevOps to legacy apps. • Myth 3: There’s not enough time to implement DevOps. • And more!
Tags : 
    
Puppet

Digital Ad Environments Need Health Checks Too

Published By: Oath     Published Date: Nov 06, 2017
42% of consumers make the internet their first stop for healthcare information, ranking the web second to actual physicians. Following this trend, healthcare marketers have increased their investment in a variety of digital advertising channels such as native, video, mobile, content and more in order to better educate and inspire healthcare consumers. But whatever digital channels healthcare marketers choose, the environment matters. Consumers make snap judgments about brands based on adjacency. Over two-thirds of your audience will feel less favorably towards a brand if its placed next to untrustworthy, offensive, or low-quality content. Fortunately for brands the flip side is also true, which is why it’s imperative that you guarantee ad placements that share digital space with premium content. With Oath’s reputation as a trusted publisher, healthcare brands can experience peace of mind knowing their consumers will make positive associations that will increase brand loyalty.
Tags : 
healthcare, physicians, digital, advertising
    
Oath

DIGITAL DNA

Published By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : 
digital, cloud, cloud computing, internet of things, intrastructure, virtualization, infrastructure
    
Entrust Datacard

Digital reinvention - Trust, transparency and technology in the insurance world of tomorrow

Published By: IBM     Published Date: May 27, 2014
If insurers want to succeed in today's digital world, they need to create experiences and business models that are orchestrated, symbiotic, contextual and cognitive.
Tags : 
ibm, big data, insurance, digital insurer, business model, insurance industry, technology, integration, social business, it management
    
IBM

Digital Reinvention - Trust, Transparency and Technology in the Insurance World of Tomorrow

Published By: IBM     Published Date: Aug 06, 2014
If insurers want to succeed in today's digital world, they need to create experiences and business models that are orchestrated, symbiotic, contextual and cognitive.
Tags : 
ibm, insurance, digital, business model, technology, transparency, business technology
    
IBM

Digital reinvention - Trust, transparency and technology in the insurance world of tomorrow

Published By: IBM     Published Date: Aug 08, 2014
If insurers want to succeed in today's digital world, they need to create experiences and business models that are orchestrated, symbiotic, contextual and cognitive.
Tags : 
digital reinvention, digital world, insurance, trust
    
IBM

Digital Reinvention: Trust, Transparency and Technology in the Insurance World of Tomorrow

Published By: IBM     Published Date: Feb 24, 2015
If insurers want to succeed in today's digital world, they need to create experiences and business models that are orchestrated, symbiotic, contextual and cognitive.
Tags : 
digital reinvention, ibm, digital insurer, digital technologies
    
IBM

Digital Transformation in Sales: Evolving the Art of Customer Engagement

Published By: Microsoft     Published Date: Jan 05, 2017
Customer engagement requires an organization-wide commitment to creating meaningful connections, building relationships, and nurturing those relationships to establish trust and keep your brand top-of-mind.
Tags : 
microsoft, customer service, customer engagement, digital sales, lead nurturing, customer interaction service, customer relationship management, customer satisfaction, ebusiness, sales automation, customer experience management, business technology
    
Microsoft

Digital transformation in sales: evolving the art of customer engagement eBook

Published By: Microsoft     Published Date: Jul 20, 2018
For sales organizations, customer engagement is about more than touchpoints—it’s about everything that happens in between personal and digital encounters. Customer engagement requires an organization-wide commitment to creating meaningful connections, building relationships, and nurturing those relationships to establish trust and keep your brand top-ofmind. “The realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle.” - Altimeter Group The realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle. - Altimeter Group Customer engagement drives every interaction, every process, and every decision—and it’s the key to driving sales. In fact, respondents from a May 2016 Microsoft survey of sales leaders across multiple industries ranked customer engagement the #1 dr
Tags : 
    
Microsoft

Digital transformation in sales: evolving the art of customer engagement eBook (existing)

Published By: Microsoft Azure     Published Date: Apr 10, 2018
For sales organizations, customer engagement is about more than touchpoints—it’s about everything that happens in between personal and digital encounters. Customer engagement requires an organization-wide commitment to creating meaningful connections, building relationships, and nurturing those relationships to establish trust and keep your brand topof-mind.
Tags : 
    
Microsoft Azure

Digital Transformation Trends in Public Safety

Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Most of the public and its public safety professionals live and work in a digital world of mobile devices, instant connectivity, and geo-location. This one powerful fact is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices.1 With the help of advanced technologies, citizens and trusted partners, agencies are: Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.

Digital Trust for Banking in the age of insecurity

Published By: Group M_IBM Q119     Published Date: Jan 22, 2019
In an age of constant cyber threat, security for financial services firms must go beyond playing defense. Experts from IBM and the Federal Reserve explain what a culture of Digital Trust looks like and how to build it.
Tags : 
    
Group M_IBM Q119

Discover Vulnerability Intelligence for ALL your Applications and Systems

Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera

Disruption in the C-Suite: How the push towards digital transformation is changing the CxO dynamic

Published By: Apptio     Published Date: Jul 16, 2019
We know that digital transformation is changing the economics of IT, but is this influencing CXO dynamics and strategic decision-making? To determine this, the Financial Times (FT) Focus partnered with Apptio to survey more than 550 C-suite leaders in technology and finance globally. Download this FT Focus report to discover how to: - Bridge the trust gap and ease tensions between the Office of the CIO and the CFO with accountability and real-time data - Leverage digital transformation to foster greater collaboration and avoid creating blurred responsibilities across the C-suite - Help leaders at global brands embrace AI, reskilling, cloud, Agile, and decentralized decision-making to move at hyperspeed and deliver value.
Tags : 
    
Apptio

Distributed workforce management in the cloud: Spreading IT security wherever employees roam.

Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device, distributed computing, infrastructure, network security, remote access, remote network management, mobile computing, mobile data systems, mobile workers, pda, smart phones, wireless communications
    
Symantec.cloud

Do You Deserve to be Trusted? Key considerations for building & maintaining a trusted online brand

Published By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : 
truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
    
TRUSTe

Dominion Investment Group Case Study

Published By: Polycom     Published Date: Mar 13, 2015
The Dominion Group of Companies offers clients a wide range of professional services, including investment advising, trust services, wealth management, and insurance. Based in Virginia Beach, Virginia, the company has three main offices as well as independent affiliate offices in multiple locations throughout the United States. Dominion is a small but growing company, currently employing 40 people. A recent opportunity for expansion of the trust side of the business required Dominion to branch out from its Virginia Beach headquarters, opening an office in Florida and relocating one of the firm’s principals to that location. A top priority during that transition was maintaining effective communication, despite the distance, to limit any disruption to existing client services and workflows.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.