truste

Results 226 - 250 of 317Sort Results By: Published Date | Title | Company Name

Stepping up the Battle Against Advanced Threats WP

Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications, employee performance
    
IBM

Holistic Fraud Prevention: Transforming the Customer's Experience

Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security, compliance, disaster recovery, email security, internet security, intrusion prevention, security management, data loss prevention
    
IBM

Top Ten Criteria For Selecting A Managed Services Provider

Published By: IBM     Published Date: Oct 06, 2015
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, services provider, services provider selection, it organizations, it service providers, reduce cost, technology innovation, top ten criteria, it management, wireless, data management
    
IBM

Stepping up the battle against advanced threat

Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal, software development, enterprise applications
    
IBM

Information empowerment for your evolving data ecosystem

Published By: IBM     Published Date: Jan 13, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, data, infosphere, server, data warehousing, enterprise applications, data management, business technology
    
IBM

The MDM advantage: Creating insight from big data

Published By: IBM     Published Date: Apr 18, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, data management
    
IBM

Enhanced 360-degree view of the customer

Published By: IBM     Published Date: Apr 18, 2016
"Five high-value uses for big data: IBM has conducted surveys, studied analysts’ findings, talked with more than 300 customers and prospects and implemented hundreds of big data solutions. As a result, it has identified five high-value use cases that enable organizations to gain new value from big data."
Tags : 
ibm, mdm, big data, trusted data, data solutions, data management
    
IBM

Who's afraid of the big (data) bad wolf?

Published By: IBM     Published Date: Apr 18, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions
    
IBM

Information Empowerment for Your Evolving Data Ecosystem

Published By: IBM     Published Date: Apr 18, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, big data, ibm infosphere, information empowerment, data integration, data management
    
IBM

Fraud Protection Doesn't have to be an uphill battle

Published By: IBM     Published Date: Sep 30, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, security, web fraud, fraud protection, cyber security, enterprise applications, business technology
    
IBM

TrustRadius Report on IBM Cloudant

Published By: IBM     Published Date: Jun 21, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 22 ratings and 21 in-depth user reviews of Cloudant on TrustRadius, the trusted user review site for business software. By crowd-sourcing user perspectives, we help you to get a true sense of the product. This report includes analysis of the types of customers (company sizes, industries etc.) that use Cloudant, what companies and users like most about the product, as well as areas for improvement
Tags : 
ibm, ibm cloudant, demographic, cloud computing, decision making
    
IBM

Best practices for establishing trusted authentication

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : 
trusted authentication, authentication methods, security, ibm
    
Group M_IBM Q1'18

Yankee Group Whitepaper Sponsored by McAfee- The Truth About Trust Marks

Published By: McAfee, Inc.     Published Date: May 21, 2009
In this white paper written by Yankee Group and sponsored by McAfee, learn why daily vulnerability scanning is the kind of tough , no-nonsense measure that your consumers may be looking for before they can open up their wallets.
Tags : 
yankee, mcafee, trust marks, security, vulnerability management, e-commerce, reputation, privacy, truste, bbb, reputation, ssl, verisign, scanning
    
McAfee, Inc.

Seven Content Strategies to Build Trust with Today's Savvy Consumers

Published By: Junta42     Published Date: Aug 20, 2009
How do you create trust and meaningful marketing content that doesn't read like a sales pitch? In an age of digital noise and an abundance of information, how do you reach your target audience and become a trusted brand? This eBook will show you how.
Tags : 
trust, junta 42, marketing content, ebook, target audience, digital noise, branding, loyalty, self-serving promotion, social networking, google, twitter, technorati, boardreader, mastercard, trusted
    
Junta42

The ROI of Trust: Building Business Success in an Era of Privacy and Trust Concerns

Published By: TRUSTe     Published Date: May 06, 2010
This whitepaper will explore how business leaders like yourself can align trust, credibility and privacy processes in your organization-and your company's broader ecosystem-into a Business Integrity Strategy.
Tags : 
truste, roi, privacy, trust, credibility, business integrity strategy, identity
    
TRUSTe

5 Data management for analytics best practices

Published By: SAS     Published Date: Aug 28, 2018
“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. By some reports, most data scientists spend 50 to 80 percent of their model development time on data preparation tasks. SAS adheres to five data management best practices that help you access, cleanse, transform and shape your raw data for any analytic purpose. With a trusted data quality foundation and analytics-ready data, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes to build a data-driven business.
Tags : 
    
SAS

Top ten criteria for selecting a managed services provider

Published By: IBM     Published Date: Oct 10, 2013
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
cloud computing, managed services, it service providers, ibm, cost reduction, complexity mangement, it organization, partnership, managed services provider, business intelligence, business technology
    
IBM

The Value of Expert Earned Media Consumption

Published By: inPowered     Published Date: Sep 20, 2013
Read this white paper from inPowered and Marketing Evolution to understand how major brand marketers are leveraging their earned media, written by trusted category experts, to drive serious lifts in brand favorability, advocacy, and purchase intent and achieve ROI 7-14x campaign investment levels.
Tags : 
forrester, inpowered, marketing, earned media, media, marketing automation
    
inPowered

Top ten criteria for selecting a managed services provider

Published By: IBM     Published Date: Apr 22, 2014
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, managed services provider, managed services, it management, it service providers, cloud computing, service management
    
IBM

Transforming the Enterprise with Secure Mobility

Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco

The Dollars & Sense of Driving Client Funding

Published By: Xero     Published Date: Feb 18, 2014
Build your reputation as a trusted advisor by showing clients how to work directly with alternative lenders to gain access to funding. Led by a panel of Xero Add-on Partners, BodeTree and Kabbage, and advised by Xero Partner David Tunstall, CPA, of The Tunstall Organization, you’ll walk away with a better understanding of new avenues for small business financing.
Tags : 
funding, investing, small business investing, business, billing, small business networks, eprocurement, it spending, total cost of ownership, business technology
    
Xero

Gigaom Analyst Report: The Power of Hadoop as a Service

Published By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : 
hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing, it management
    
Altiscale

Getting on the Fast Track To Subscription Revenue: The Essential Guide for IT

Published By: Recurly     Published Date: Mar 07, 2016
The subscription model fuels success for a wide variety of businesses, providing predictable revenue, encouraging customer loyalty, and powering growth. The key to managing a successful subscription business is a trusted, flexible and secure subscription billing solution that provides both technical and operational expertise—and that doesn’t require massive integration effort and expense.
Tags : 
recurly, subscription revenue, subscription business, billing solutions, networking, it management, wireless, data management, business technology
    
Recurly

Choosing a Cloud Hosting Provider with Confidence

Published By: Symantec     Published Date: Jun 29, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, cloud security, enterprise, regulatory compliance, data segregation, data recovery, business technology
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.