boardroom

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks

2016 Buyers Guide:  Making Smart Group Video Collaboration Decisions

Published By: Polycom     Published Date: Jun 08, 2016
"Over the years, the features, functions, and capabilities offered by group video conferencing systems have expanded and evolved. And the requirements and expectations of collaboration users have changed along with them. This 2016 Buyers Guide helps end users understand the features and functions needed to collaboration-enable five of the most common spaces found in enterprises of all sizes; - small (huddle) rooms - teaming spaces - standard meeting rooms - executive boardrooms - reconfigurable (and perhaps divisible) spaces Download the ""2016 Buyers Guide: Making Smart Group Video Collaboration Decisions"" by Wainhouse Research that will help you make informed decisions regarding your video collaboration strategy."
Tags : 
best practices, budget, business optimization, business management, collaboration, business intelligence
    
Polycom

Analytics in the Boardroom

Published By: Destination Analytics     Published Date: Apr 06, 2012
Organizations that take a wait-and-see approach to analytics are falling behind their more determined peers. Read to find out more.
Tags : 
ibm, technology, netezza, analytics, enterprise analytics, business analytics, customer relationship management, customer satisfaction, customer service, application integration, analytical applications
    
Destination Analytics

Application Development In The Age of Business Automation: Fast, Flexible and Flowing

Published By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
    
Red Hat

Board-Portale: 10 Kritische Fragen

Published By: Diligent     Published Date: Aug 05, 2016
This whitepaper reveals some of the most commonly asked questions about board portals and how they can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portals, boardroom, sharing information, information management, content management system, document management, intranets
    
Diligent

Book Summary of Winning by Jack Welch with Suzy Welch

Published By: Skillsoft     Published Date: Mar 27, 2015
Everyone wants to win, not everyone knows how. Winning isn’t only important for top executives but for everyone — from the boardroom to the mailroom — who wants to get ahead and help his or her organization. The two are intertwined. For an individual, winning is personal. In the business world, winning is multidimensional. The successful salesperson, for example, helps not only himself but also his company and everyone connected with it. Even the most talented businessperson with the best intentions will get nowhere unless he or she knows how to win in today’s complex business world. Business is a game, and winning that game is a total blast! Download Winning by legendary CEO, Jack Welch with Suzy Welch and learn how to be on the winning team.
Tags : 
leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers, jack welch
    
Skillsoft

Boosting Productivity Among Today’s Decentralized Workforce with Video Conferencing

Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing, remote video conferencing, video conferencing software, boyd video conferencing, video conferencing applications, software development
    
Arkadin

Breaches and the Boardroom: Lessons Learned in Cybersecurity

Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
The purpose of this article is to provide the reader with several key insights that can better prepare your organization for mitigating security breaches
Tags : 
    
Concerto Cloud Services

Cloud-Based Video Conferencing: A Flexible Approach to Face-to-Face Communication

Published By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : 
video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources
    
Blue Jeans Network

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks

Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, it management
    
Palo Alto Networks

Data to Decisions Business and Technology Trends Enterprises Must Track Through 2024

Published By: MicroStrategy     Published Date: Aug 28, 2019
The Constellation AstroChartTM supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The AstroCharts’ vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the Constellation’s business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplin
Tags : 
    
MicroStrategy

Data to Decisions Business and Technology Trends Enterprises Must Track Through 2024

Published By: MicroStrategy     Published Date: Nov 08, 2019
The Constellation AstroChartTM research supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplinary approach that
Tags : 
    
MicroStrategy

Data to Decisions Business and Technology Trends Enterprises Must Track Through 2024

Published By: MicroStrategy     Published Date: Nov 08, 2019
The Constellation AstroChartTM research supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplinary approach that
Tags : 
    
MicroStrategy

Deliver All Analytics for All Users Through a Single Product in the Cloud

Published By: SAP     Published Date: Jul 18, 2016
The SAP® BusinessObjects™ Cloud solution offers all analytics capabilities for all users in one product. In the boardroom, at the office, or in front of a customer, you can discover, analyze, plan, predict, and collaborate in one integrated experience designed expressly for the cloud. Read the solution in detail to learn how to turn instant insight into quick action.
Tags : 
    
SAP

Does Your Code of Conduct Program Hit the Mark? Ten Questions You Should be Asking yourself

Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft

Finance Technology: A new landscape for a digital world

Published By: BlackLine     Published Date: May 24, 2018
Digital transformation is the new boardroom buzzword. But what does this really mean for finance teams, and why does it matter? Beyond the hype, real change is underway.
Tags : 
    
BlackLine

Five Keys to Successful Automated Marketing

Published By: Oracle     Published Date: Sep 30, 2019
In the past, B2B transactions occurred in face-to-face meetings as a sales professional worked a product demo, business luncheon, or boardroom presentation to influence a customer – and close the deal. Today, however, B2B stakeholders perform much of their product and service research online. In fact, 93 percent of B2B buying starts with online searching, according to a Pinpoint Market Research study. This research occurs long before a customer engages with sales. As your prospects research and evaluate your offerings, they leave behind valuable clues to their intent. Understanding these clues – cracking the code – can help you tailor your messages to them, thereby providing them a more tailored, relevant experience. As a result, business-savvy marketing and sales departments have embraced marketing automation platforms, so their respective teams can work together on one common platform, reach B2B customers online, and drive revenue. Marketing automation platforms automate repetitive
Tags : 
    
Oracle

From Website Security Architecture To The Boardroom: Optimizing Your Business

Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert

IBM 2016 C-suite Study

Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, network security, business technology
    
IBM

IBM 2016 C-suite Study

Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.