rios

Results 1 - 25 of 259Sort Results By: Published Date | Title | Company Name

10 Questions to Identify Compliance Risks When Sharing Information

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance, access control, security management, security policies, vulnerability management
    
Brainloop

2012 Threatscape Report - Dell SecureWorks Counter Threat Unit Research Team

Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks
    
Dell SecureWorks

2013 Live Chat Effectiveness Report

Published By: LogMeIn     Published Date: Aug 27, 2013
Built on the results of an annual survey of Internet shoppers worldwide, the 2013 Live Chat Effectiveness report outlines Internet shopper communication and purchasing behavior and preferences. The report includes findings specific to live chat technology, as well as other engagement channels, such as phone, email and social media. In this year’s report, we explore how Internet shoppers use these various channels to inform purchase decisions and seek help from customer service. Readers will learn the channels that shoppers prefer in given scenarios and how to prepare their teams for optimal engagement.
Tags : 
live chat report, social media, purchasing behavior, logmein, internet shoppers, optimal engagement, call center software, business technology
    
LogMeIn

2013 Live Chat Effectiveness Report

Published By: join.me     Published Date: Jan 29, 2014
Built on the results of an annual survey of Internet shoppers worldwide, the 2013 Live Chat Effectiveness report outlines Internet shopper communication and purchasing behavior and preferences. The report includes findings specific to live chat technology, as well as other engagement channels, such as phone, email and social media. In this year’s report, we explore how Internet shoppers use these various channels to inform purchase decisions and seek help from customer service. Readers will learn the channels that shoppers prefer in given scenarios and how to prepare their teams for optimal engagement.
Tags : 
live chat report, social media, purchasing behavior, logmein, internet shoppers, optimal engagement, wireless communications, telecom
    
join.me

2018 Customer Service Trends: How Operations Become Faster, Cheaper — And Yet, More Human

Published By: LogMeIn     Published Date: Feb 27, 2018
Customer service organizations are struggling to react to the pace of innovation and the explosion of channels and devices. To get ahead of these challenges, AD&D pros must deeply invest in automation — automated answers, automated conversations, automated agent guidance, and automated end-to-end processes. They must also invest in intelligence to ensure automated technologies evolve and learn from prior interactions over time. Automation and intelligence quell the headcount increases. They will free agents from working on low-value or repetitive tasks, as they will only have to address highly complex customer scenarios or exceptions to standard operations. This also enables them to focus on building connections with customers to garner their satisfaction and loyalty.
Tags : 
customer, service, operations, optimization
    
LogMeIn

5 Reasons Leaders Invest in Language Training

Published By: Rosetta Stone     Published Date: Apr 03, 2018
For many companies, language barriers increase as business globalization becomes the norm rather than the exception. Perhaps a call center agent cannot handle customer contact in an unfamiliar language. Or a manager travels to a face-toface meeting only to sit across a conference table from clients wanting to speak in their own native language. Even within your organization, teams across global geographies must collaborate to achieve collective goals, but language barriers often stand in their way. Meanwhile, HR leaders are tasked with recruiting and retaining top talent and L&D managers must align programs with business goals. Each of these scenarios and areas of responsibility have something in common: A clear need for company-sponsored training to develop employees’ language proficiency so they can engage successfully with colleagues and customers anywhere. Thousands of learners were surveyed about the impact of language training with Rosetta Stone® business solutions.1 Results show
Tags : 
    
Rosetta Stone

5 Steps to 11ac Migration

Published By: Aruba Networks     Published Date: Nov 15, 2013
802.11ac va por buen camino para convertirse en el modelo para la próxima generación de Wi-Fi. La velocidad de transmisión de gigabits, su capacidad mejorada y la fiabilidad que proporciona 802.11ac a las redes inalámbricas LAN son amplificadas ya que el número de usuarios de móviles y dispositivos, así como el uso de aplicaciones continúan creciendo a gran velocidad. Tanto como si usted es uno de los primeros que ya han empezado a planificarse como si, al igual que les sucede a diversas organizaciones, no está seguro de qué es lo siguiente que debe hacer, descárguese esta guía en cinco pasos que le ayudará a prepararse y planificar una migración exitosa a WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks

7 Use Cases of Service Virtualization

Published By: CA Technologies     Published Date: Jun 03, 2015
"Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies

7 Use Cases of Service Virtualization

Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies

A Best Practices Webinar for Higher Education and Nonprofits

Published By: Adaptive Planning     Published Date: Dec 06, 2011
Are you getting as much value as you can out of your budgeting, forecasting, monthly reporting, and what-if scenarios? Are they integrated and aligned? Are they really creating strategic value? Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2012.
Tags : 
adaptive planning, nonprofit, finance, fp&a, budget, business decisions, value, reporting
    
Adaptive Planning

A Cloud security checklist for IT

Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless

A Comprehensive Range of Solutions for All Types of UC Users and Applications

Published By: Plantronics     Published Date: Oct 18, 2013
The following describes some typical UC usage scenarios, and how you can deploy products that will maximize productivity while minimizing downtime, excessive inventory costs, operational overhead, and unsatisfied users.
Tags : 
plantronics, solutions for uc users, solutions for uc applications, sound innovation, mobile and wired workers, web-based collaboration, voice communications, deploy products
    
Plantronics

A SANS Product Review: See the results of the SANS evaluation of the CrowdStrike Falcon® platform

Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike

A SANS Product Review: The results of the SANS evaluation of the CrowdStrike Falcon® platform

Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike

Accelerating Microsoft Office 365 with Riverbed Steelhead SaaS

Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelHeadTM SaaS addresses cloud services/software as a service (SaaS) performance challenges by providing an easy-to-deploy optimization solution that meets customer needs for application performance over WAN and Internet connections. Combining private wide area network (WAN) and public internet optimization, the SteelHead SaaS is a first-of-its-kind solution, which optimizes traffic across the public Internet with Riverbed’s award-winning SteelHead optimization system (formerly RiOS or Riverbed Optimization System) technology to accelerate data and application protocols. SteelHead SaaS delivers optimized performance up to 30x for cloud services/SaaS applications, such as Microsoft Office 365 or Salesforce.com, regardless of where the end user is located.
Tags : 
saas, cloud services, internet connections, application performance, wide area network, optimization, business intelligence, cloud computing
    
Riverbed

Acelerar la transformación digital en la industria IM&C

Published By: SAP SME     Published Date: Apr 10, 2018
La industria de manufactura discreta es un facilitador clave de éxito en otras industrias, es por eso que necesitan reconocer y adoptar nuevas prioridades estratégicas para triunfar. Obtener una ventaja digital requiere la adopción de nuevas tecnologías, el aprovechamiento de los datos y la optimización de los procesos de negocio necesarios para impulsar la innovación y el valor central del negocio. Nuevas tecnologías como IoT e Inteligencia Artificial pueden ayudar a aprovechar la gran cantidad de datos que generan las empresas de fabricación y convertirlos en impulsores de éxito.
Tags : 
    
SAP SME

Active Directory Recovery: What it Is, What it Isn't

Published By: Dell Software     Published Date: Oct 01, 2012
Are you prepared for common Active Directory failure scenarios? Are you counting on the Recycle Bin, only to find what you need isn’t there? Learn what you can and can’t do with AD native tools, and how the right third-party tools can automate recovery and put you back in control.
Tags : 
native active directory, delegation, desktop management, ad native tools
    
Dell Software

Active Directory Recovery: What it Is, What it Isn't

Published By: ScriptLogic     Published Date: Mar 30, 2012
In this whitepaper, we will walk through a couple of recovery scenarios and how you can accomplish this using native tools and how it could be accomplished using Active Administrator.
Tags : 
active directory, active directory recovery, auditing, native tools, centralized, data, secure, database
    
ScriptLogic

Activos inteligentes conectados

Published By: TIBCO Software     Published Date: Sep 16, 2019
La industria petrolera se está transformando de manera dinámica gracias el poder de conexión del Internet, los avances en sensores remotos conectados, y las posibilidades que ofrece el machine learning y la inteligencia artificial (IA). A medida que la búsqueda de hidrocarburos y fuentes de energías alternativas se amplía a entornos más profundos y hostiles, los operadores, las compañías de servicios y los propietarios de los recursos están aprovechando los avances tecnológicos para garantizar que sus empleados estén más seguros, sus campos sean más productivos y sus activos fijos estén operando a su máximo nivel de eficiencia.
Tags : 
    
TIBCO Software

Advancing the Data Agenda: Roles and Responsibilities in the Data Quality Trenches

Published By: DataFlux     Published Date: Jan 07, 2011
This white paper, the first in a sequence, addresses the question, "who, specifically, are those right groups and right people?" on several different levels. It also highlights underlying principles that, properly applied, lead to solid answers to the "who" questions for a wide variety of scenarios.
Tags : 
dataflux, data agenda, data quality, governance, analytics, measurement and reporting, automation, test and measurement
    
DataFlux

Agulha em um palheiro de dados: o surgimento do Big Security Data

Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança
    
McAfee

An Engaging Employee Experience

Published By: Cornerstone OnDemand     Published Date: Sep 13, 2016
Are your employees truly connected to—and engaged with— your business? In a perfect world, every employee is committed to your organization’s goals, is ready to go above and beyond in daily activities, and actively collaborates with other team members. Yet when it comes to employee engagement, there’s a big gap between perfect world scenarios—and the reality.
Tags : 
    
Cornerstone OnDemand

An Engaging Employee Experience

Published By: Cornerstone OnDemand     Published Date: Feb 07, 2017
Are your employees truly connected to—and engaged with—your business? In a perfect world, every employee is committed to your organization’s goals, is ready to go above and beyond in daily activities, and actively collaborates with other team members. Yet when it comes to employee engagement, there’s a big gap between perfect world scenarios—and the reality.
Tags : 
    
Cornerstone OnDemand

An Engaging Employee Experience – The Ultimate Guide

Published By: Cornerstone OnDemand     Published Date: Feb 12, 2015
In a perfect world, every employee is committed to your organization’s goals, is ready to go above and beyond in daily activities, and actively collaborates with other team members. Yet when it comes to employee engagement, there’s a big gap between perfect world scenarios—and the reality.
Tags : 
cornerstone ondemand, employee engagement, leadership, development strategy, employees, high performing, operational leadership, business success
    
Cornerstone OnDemand

An Incident Response Playbook: From Monitoring to Operations

Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.