third party

Results 101 - 125 of 295Sort Results By: Published Date | Title | Company Name

Reduce The Risk Of Insider-Related Data Loss With Intelligent, Integrated Security From IBM

Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM

The Anatomy of Today's Mobile Organization

Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
    
Lenovo and Intel®

Reduce The Risk Of Insider-Related Data Loss With Intelligent, Integrated Security From IBM

Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM

Forrester Study: Closing the Cloud Email Security Gap

Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast

20 Questions For CIOs On Hybrid Clouds

Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions

Developing A Data Integration And Lifecycle Management Strategy For A Hybrid Environment

Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
data integration, lifecycle management, hybrid environment, cloud-based data, information governance, decision making
    
IBM

Prepare And Maintain Your Data - Data Quality And Master Data Management In A Hybrid Environment

Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
cloud-based data, data quality, data management, hybrid environment, decision making
    
IBM

Enterprise Data Security: The Basics Of User Behavior Analytics

Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies

Developing a Data Integration and Lifecycle Management Strategy for a Hybrid Environment

Published By: IBM     Published Date: Mar 30, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
cloud security, electronic security, health care, security risk management, user authentication, cloud technology
    
IBM

HOW DIGITAL TRANSFORMATION ELEVATES HUMAN CAPITAL MANAGEMENT

Published By: Adobe     Published Date: Mar 21, 2017
This paper examines the ongoing transformation of HR through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
    
Adobe

3 Reasons IT Needs a New Approach for Third-Party Access to Sharepoint

Published By: Akamai Technologies     Published Date: Feb 23, 2017
Microsoft’s SharePoint Platform is used by tens of thousands of enterprises worldwide to share information with employees and third parties. Many of these users access Sharepoint remotely, which is cumbersome and put the enterprise at risk. Read this paper to learn three reasons why IT needs a new approach to third-party access to Sharepoint.
Tags : 
third-party, access, sharepoint, platform, remote, enterprise
    
Akamai Technologies

Painless, Secure Third-Party Access

Published By: Akamai Technologies     Published Date: Feb 23, 2017
Companies are increasingly using outside contractors and suppliers stay competitive, which means granting third-parties access to applications via VPN or VDI. This reliance causes increased complexity and burden on the Enterprise team while also creating additional security risk, as third-party access creates additional points of entry to an organization’s network. Read this solution brief to learn about a new painless, secure approach to remote access.
Tags : 
painless, security, third-party, resources, enterprise, vpn, solution
    
Akamai Technologies

From Obligations to Opportunities: Building Your Next-Generation Auditing Solution

Published By: Rizepoint     Published Date: Feb 13, 2017
Every successful multi-unit food service or hospitality organization understands the importance of consistent audits and recognizes the essential function they provide. Today, thousands of businesses—from giant multi-national chains to small family-owned businesses—depend on regular internal and third-party audits to monitor, control, and manage everything from sanitation and food safety regulations to internal facility standards and brand consistency.
Tags : 
    
Rizepoint

Developing data integration and lifecycle management strategy for a hybrid environment

Published By: IBM     Published Date: Jan 27, 2017
Cloud- based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on- premises data with new third- party cloud- based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM

Prepare and maintain your data - Data quality and master data management in a hybrid environment

Published By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in “The truth about information governance and the cloud,” most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM

Evaluation of the Cisco TelePresence SX10 Quick Set Group Video Conferencing System

Published By: Cisco     Published Date: Dec 21, 2016
In the last few months, WR has observed that the SX10 has found its way into offices and small meeting rooms of many of our enterprise consulting clients. In some cases, the SX10 was the first Cisco video product ever installed in those environments. This prompted us to take a closer look at this system. This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.1
Tags : 
    
Cisco

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

ThousandEyes for Application Delivery

Published By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
    
ThousandEyes

A to Z: Why Office 365

Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365

Mitigating Security Risk from Partners, Affiliates and Suppliers

Published By: Secureworks     Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
Tags : 
managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security, intrusion prevention, vulnerability management
    
Secureworks

The Butterfly Effect

Published By: KPMG     Published Date: Nov 07, 2016
Seemingly unrelated events can conspire to harm your business when you rely on far-flung networks of suppliers, vendors, and service providers. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends, enterprise applications
    
KPMG

Cyber Supply Chain Security for Web Applications

Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security, enterprise applications, business technology
    
Veracode

A PRESCRIPTIVE GUIDE TO Third Party Risk Management

Published By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
    
NAVEX Global

Omnichannel: 5 Roadblocks to Avoid on the Journey to Omnichannel Retail Success

Published By: IBM     Published Date: Oct 11, 2016
Third party white paper from FitforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : 
ibm, commerce, b2c, b2c ecommerce, ecommerce, omnichannel, retail success, knowledge management, enterprise applications, business technology
    
IBM

HOW DIGITAL TRANSFORMATION ELEVATES HUMAN CAPITAL MANAGEMENT

Published By: Adobe     Published Date: Oct 05, 2016
Forbes Insights examined the ongoing transformation of HR through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.