trust

Results 101 - 125 of 1013Sort Results By: Published Date | Title | Company Name

The perimeter’s gone. Can your security handle it?

Published By: MobileIron     Published Date: Apr 22, 2019
Protect the modern enterprise with a mobile-centric, zero trust framework.
Tags : 
    
MobileIron

The perimeter’s gone. Can your security handle it?

Published By: MobileIron     Published Date: Apr 22, 2019
Protect the modern enterprise with a mobile-centric, zero trust framework.
Tags : 
    
MobileIron

A Practical Guide to Turn Your Online Reviews Into in-store Sales

Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust

Stopping the Attackers You Trust: A deception-based approach to insider threats

Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management
    
Illusive Networks

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust

KuppingerCole Report: Integrating Password and Privilege Management for Unix and Linux Systems

Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust

Don't let bad data compromise your intelligence

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19

Eagle Eye taps Rackspace expertise to migrate and grow its business on the Google cloud

Published By: Rackspace     Published Date: Apr 02, 2019
Traditional retailers seeking to digitalize their brand connections to customers, do so with Eagle Eye AIR, a SaaS platform for creating intelligent, real-time digital and mobile solutions for promotions, loyalty programs, rewards and more. With rapid business growth, the volumes of transactions processed per second are constantly being rewritten – yet, its customers’ transactional throughput keeps running smoothly – which is all thanks to the successful migration of its dedicated infrastructure to Google Cloud Platform (GCP). Being a longstanding customer of Rackspace, Eagle Eye trusted the Rackspace Managed Services team in providing expert guidance for every stage of its migration project – which is part of a bigger exercise to transform its technical capabilities.
Tags : 
    
Rackspace

P9 Benefits and Checklist

Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
POWER9 provides the infrastructure foundation for a future-looking organization that is ready to meet today’s business challenges and tomorrow’s advancements. By updating your foundation with the latest POWER9-based servers, you can effectively run your mission-critical requirements alongside modern, dataintensive workloads. POWER9 gives you the reliability you’ve come to trust from IBM Power Systems, the security you need in today’s high-risk environment, and the innovation to propel your business into the future.
Tags : 
    
Group M_IBM Q2'19

MIT SMR: Data, Analytics & AI: How Trust Delivers Value

Published By: SAS     Published Date: Mar 20, 2019
Seeing value from analytics and emerging technologies such as AI begins with trust in the data. That trust relies on how data is collected, shared, protected and used. The annual Data and Analytics Global Executive Study with MIT Sloan Management Review looks at how 2,400 global business leaders make decisions based on analytics insights – and what steps are needed to get trustworthy data.
Tags : 
    
SAS

The secret of IT Success? Enabling Choice and Control

Published By: SAS     Published Date: Mar 20, 2019
In today’s crowded analytics marketplace, who can you trust? What’s needed to deliver on the promise of transforming data into real value? And what do CIOs need to cost-effectively and successfully lead their organizations through changing technologies? For an organization to experiment with (and ultimately deploy) analytics, the responsibility falls squarely on the shoulders of IT. IT must provide secure access to lots of high-quality data, a friendly environment for experimentation and discovery, and a method for rapidly deploying and governing models. SAS can support an organization's journey toward becoming a data- and analytics-driven organization. We can help unlock the value by enabling with choices that make sense. Plus, we can show organizations how to get the most out of technology investments.
Tags : 
    
SAS

From the Core to the Edge: 7 Reasons You Need Security at the Edge

Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies

Lowering Commercial Automotive Insurance Costs

Published By: SambaSaftey     Published Date: Mar 15, 2019
Best practices for taking control. The numbers don’t lie: Driver monitoring can reduce accidents, save organizations money, and protect the people and communities you serve. Advances in safety technology, like comprehensive driver monitoring solutions, are enabling companies not only to stay safer, but to better navigate the tricky territory of insurance. By following a few new best practices, you can manage insurance costs and protect your company’s bottom line before your drivers even hit the road. In our free white paper, “Lowering Commercial Automotive Fleet Insurance Costs,” we’ll show you: • The many ways vehicle crashes affect the bottom line • A deeper look at the risks of employer- and employee-owned vehicles • How negligent entrustment suits can snare companies in any industry • How to mitigate risk and take control of insurance
Tags : 
    
SambaSaftey

How Magic Video, A Fast Growing Video Platform, Improves UX through Application Acceleration

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

Where does AI fit within HR?

Published By: Oracle     Published Date: Mar 04, 2019
Watch this webinar to understand exactly where AI fits within HR. Euan Semple, speaker, writer and consultant, describes how you could apply AI and ML within HR to drive meaningful change.But before that can happen, teams need to trust the technologies they’re using.
Tags : 
    
Oracle

How Your Trusty Office Printer Can Put Your Legal Files At Risk

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America

eBook: Is 3D Scanning Right for Your Inspection Needs?

Published By: 3D Systems     Published Date: Feb 28, 2019
Combining the right people, hardware, and software to ensure quality everywhere Quality and reliability matter more than ever. In today’s hypercompetitive environment, companies can’t afford to lag behind when it comes to the quality of their products. And management can’t lag behind when it comes to adopting new tools and technologies to ensure quality everywhere. Over the past two decades, 3D scanning has become a crucial tool in many manufacturers’ measurement and inspection arsenals. It’s an effective metrology technique that is trusted for its accuracy, reliability, speed, and ease of use. Its noncontact nature and exceptional flexibility make it ideal for measuring a wide range of parts in a wide range of places. An effective approach to 3D scanning requires matching the right people with the right hardware and the right software to best meet your company’s measurement needs. This eBook will help you determine if 3D scanning is right for your inspection needs, and if it is, how b
Tags : 
    
3D Systems

First Citizens Bank Unites Systems, Services, and Customer Satisfaction

Published By: TIBCO Software     Published Date: Feb 26, 2019
First Citizens Bank First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services, including personal and business banking, investment and insurance services, wealth management, and more.
Tags : 
    
TIBCO Software

The Red Hat Enterprise linux Subscription Advantage

Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat

IDC: Business Value of Red Hat Enterprise Linux

Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat can help you deliver 348% ROI and achieve agile, high-performing infrastructures Linux® has become the standard operating system for cloud infrastructure as well as the preferred delivery vehicle for modern applications. This is, in part, thanks to it being reliable environment that offers scale, security, and robust application support. Red Hat® Enterprise Linux expands on this trust and credibility by offering a supported, hardened, enterprise environment that delivers on more efficient operational costs, better reliability and availability, and better scalability. These translate into a better return on investment (ROI) for our enterprise customers. IDC’s study, “The Business Value of Red Hat Enterprise Linux,” interviewed 12 organizations to see how they’re using Red Hat Enterprise Linux to support their business operations. These organizations reported that Red Hat provides a cost-effective, efficient, and reliable operating environment. There’s a lot to gain with Red H
Tags : 
    
Red Hat

Try Red Hat Enterprise Linux operating system

Published By: Red Hat     Published Date: Feb 25, 2019
Evaluate Red Hat Enterprise Linux for your application deployments, datacenter infrastructure or virtual and cloud environments. Red Hat Enterprise Linux provides a reliable and secure operating system that you can trust to run your most mission critical workloads. This evaluation: Provides a single subscription for a variant of Red Hat Enterprise Linux Offers access to Red Hat's award winning Customer Portal, including knowledge, videos, and documentation Is not intended for production use
Tags : 
    
Red Hat

How Employee Advocacy Boosts Content Marketing

Published By: Smarp     Published Date: Feb 22, 2019
Employee Advocacy relies on individual expertise on social media to support companies’ and individuals’ branding needs. All of this is done through content, accessible to all those who are part of the Employee Advocacy program. How exactly do Employee Advocacy and content marketing go together? There are four aspects that make Employee Advocacy highly relevant to content marketing efforts. 1. Alignment around a shared content strategy 2. Measuring Results 3. Boosting contents reach and engagement 4. Trust and authenticity
Tags : 
content marketing, employee advocacy, social media, content visibility, brand visibility
    
Smarp

Discover Vulnerability Intelligence for ALL your Applications and Systems

Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera

How Non-profit Organizations Can Achieve Transparency and Accountability

Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
nonprofit, ngo, erp, financial transparency, accountability, social impact
    
Unit4
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.