pto

Results 76 - 100 of 440Sort Results By: Published Date | Title | Company Name

Breach Response Best Practices

Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock

Briefing: The Future of Procurement

Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG

Build Enterprise-Class Security Into Your VOIP Devices

Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoVOIP is a comprehensive security solution for application developers and device designers looking to build secure VOIP products. Its simple API means no previous crypto expertise is required, and its tiny memory footprint goes where other implementations simply can't. Download the NanoVOIP whitepaper and receive a free trial.
Tags : 
mocana, nano voip, security, application developer, device designer, encrypted voice, video, data solution
    
Mocana

Business Case for Data Protection

Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company

BYOD Is Here To Stay

Published By: LifeSize, a division of Logitech     Published Date: Feb 01, 2013
Do you work smarter on your own tablet, smartphone or laptop? Go for it, says corporate IT. Read this white paper to learn how BYOD is an emerging trend in business policy. In a recent survey 44% of firms have embraced BYOD. Will you do the same?
Tags : 
byod, bring your own device, simplicity, tablet, smartphone, laptop, byod party, lifesize
    
LifeSize, a division of Logitech

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM

Care Is The New Marketing

Published By: Sprinklr     Published Date: Feb 28, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
social customer care, customer care, customer care program, customer service, social customer service, social media customer service, social media, social
    
Sprinklr

Care Is The New Marketing

Published By: Sprinklr     Published Date: Mar 13, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
    
Sprinklr

Case Study: Munich Airport

Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software

Change Your Mobile Application Challenges Into Opportunities

Published By: HP - Enterprise     Published Date: Jun 04, 2013
There is a remarkable transformation in how people access systems and information. Mobile devices are rapidly overtaking computers as the primary information consumption means. In a recent report, The Economist has projected a growth in the number of mobile devices to reach 10 billion by 2020 and the shipment of mobile devices to be almost two times that of laptops and PCs as early as 2013.
Tags : 
mobile apps, high-quality software, app, mobile testing, mobile computing, mobile data systems, mobile workers, smart phones
    
HP - Enterprise

Cheat Sheet: Mobility and Your Remote Workforce: What to Consider Before Deploying New Laptops

Published By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : 
hardware, tpm, it security, windows, telecommunication, byod
    
Dell

Cisco Umbrella at a glance

Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA

Cisco Umbrella At A Glance

Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco

Citrix Xenclient Local Virtual Desktop Technology For Laptops

Published By: Intel Corp.     Published Date: Jul 09, 2012
Use local virtual desktops to secure and control information no matter where-or whether-users connect to the network.
Tags : 
intel, virtual desktop, citrix xenclient, business technology
    
Intel Corp.

Citrix Xenclient local virtual desktop technology for laptops

Published By: Intel     Published Date: Aug 10, 2012
Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel

Cloud-based Billing Management Disrupts the Role of the CFO

Published By: BillingPlatform     Published Date: Apr 18, 2019
Organization leaders and companies of all sizes are leveraging digital transformation to lead their markets with disruptive technology. CFOs can get in front of these technologies with a cloud-based billing solution and lead their businesses to greater success. This eBook explores how the right solution can help you: • Increase streams of revenue with new technologies like IoT and cryptocurrency • Launch product innovations quickly • Automate billing to improve customer retention Discover more today.
Tags : 
    
BillingPlatform

Collaboration for Today's Workforce: 3 Ways Any Team Can Work Better with Box

Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box

Combination of server and endpoint backup means stronger security and improved business continuity

Published By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
    
Carbonite

Common Vulnerabilities in Business IT Systems

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.

Compliance in the Mobile Enterprise

Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
    
Sybase

Connected Education Preparing for the Digital Classroom

Published By: ALE USA, Inc     Published Date: Nov 01, 2019
Today, most students in primary and secondary schools have never experienced life without the internet or smartphones. This reality is reflected in the classroom where digital learning processes and experiences are enhancing traditional textbooks and upending conventional classroom teaching methods. Online lessons, testing and assessments are now part of most curricula. Laptops, tablets and smartphones have become primary instruction tools for students, who are downloading an increasing number of online apps to enhance their digital learning experience. Teachers and lecturers alike rely on robust, reliable Wi-Fi across their campus to access the full range of teaching tools available to them.
Tags : 
    
ALE USA, Inc

Consumerisation of IT vraagt andere manier van ICT-beheer

Published By: RES Software     Published Date: Apr 08, 2013
De ontwikkeling in IT heeft de afgelopen jaren niet stil gestaan. Alleen al het concept ‘Bring Your Own Device’ (BYOD), een gevolg van Het Nieuwe Werken, veroorzaakt een verandering in de manier waarop ICT-beheer vandaag de dag wordt uitgevoerd. De grens tussen werk en privé en de technologie die thuis of op het werk gebruikt wordt, vervaagt steeds meer nu werknemers persoonlijke apparaten als een tablet of mobiele telefoon, ook op de werkvloer gebruiken. Of andersom, wanneer de arbeidskracht de werklaptop thuis op de bank nog even voor een persoonlijk rondje surfen openklapt.
Tags : 
    
RES Software

Cost of Failed Trust Report: Trust Online is at the Breaking Point

Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : 
cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity, anti spam, anti spyware
    
Venafi
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.