Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 51 - 75 of 2723Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 08, 2019
This consumer based research was designed to support Travel Brands globally by understanding critical shifts in both “customer mindset and behaviors”. Although this research is focused on Generation Z, we designed our full research around all of the generations for context: Boomer, Gen X, Millennials and Gen Z. If you would like to hear more about consumer habits and behaviors for what matters throughout the Travel Customer Journey, please reach out, we’re here to help.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 08, 2019
As a B2B marketer, you know it’s important to be “customer obsessed,” but you might be missing a critical piece of content strategy that can make a huge difference on your bottom line. According to Content Marketing Institute, 77 percent of the most successful B2B content marketers use personas. By developing strong personas, you can deliver highly customized content to your audience and improve their experiences with your brand. If it seems daunting, we recommend taking a “crawl, walk, run” approach.
Tags : 
    
Adobe
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
While monitoring is critical for any business, it is especially imperative for highly regulated industries such as healthcare. With patient data to protect and regulatory standards to meet, you need to make sure your teams are building solutions that comply. If you’re not compliant, you need to be able to quickly remediate issues, so you can still get your products out to market and deliver better patient care.
Tags : 
    
AWS
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Forcepoint     Published Date: Oct 03, 2019
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. This webinar explores how companies should rethink data security, focusing on the following three principles: Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of context and user intent Learn more about how to embrace a risk-adaptive approach to data protection.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint
Published By: PwC     Published Date: Oct 03, 2019
Selling your company takes robust planning and discipline. Whether you are divesting the business completely or bringing in a private equity investor to fuel additional growth, the process you develop and follow will play a critical role in creating value for your shareholders and family. We hope that PwC's "Exit strategies for owners of private companies" guide serves as a useful starting point for the conversations you will have with your stakeholders, trusted employees and family, as well as your advisers as you realize the value you’ve worked hard to create.
Tags : 
    
PwC
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to give the best possible defense? This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.
Tags : 
    
Pine Cove Consulting
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: Forcepoint     Published Date: Oct 02, 2019
Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise – whether it comes from personal communication, broken business processes or false positives – makes the task of identifying genuine data theft risks challenging, even for wellresourced security operations teams.
Tags : 
    
Forcepoint
Published By: Kindred Hospital Rehabilitation Services     Published Date: Oct 02, 2019
With greater emphasis being placed on care transitions and readmission rates, inpatient rehabilitation programs have the incredible potential to become high-performing centers of excellence that optimize the performance of the entire hospital. Rehabilitation is so critical because it is key to patient recovery for medically complex patient populations that continue to grow as the population ages, and essential in reducing readmissions and associated financial penalties. However, maintaining a well-run rehab unit is complex and requires specialized expertise.
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: MindTouch     Published Date: Oct 02, 2019
In the world of knowledge management (KM) vendor selection, it’s easy to promise the world. Often, it comes down two types of KM solutions: knowledge base software bundled into an existing CRM suite; and the standalone KM platform. Which is best? We’ve put together an exhaustive list to help you choose a solution capable of delivering service excellence across all customer-facing channels.
Tags : 
customer journey, customer success, digital transformation, knowledge base, knowledge centered service (kcs), self-service
    
MindTouch
Published By: MindTouch     Published Date: Oct 02, 2019
Understanding the important role that your support content plays (i.e. help docs, user guides, FAQs, troubleshooting steps, product information, etc.) can help organizations avoid creating frustrating journeys for their customers who simply need help. Undervaluing how customers seek answers is a critical oversight. To understand why, it helps to examine the place they’re most likely to start: Google.
Tags : 
content strategy, customer engagement, customer journey, customer success, digital transformation, knowledge base, online help, product documentation
    
MindTouch
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: Pure Storage     Published Date: Sep 27, 2019
In today’s environment, business continuity is a necessity. As organizations embrace digital transformation and turn to IT for almost all most critical operations, downtime can be crippling. Those that are able to tolerate technology failures transparently—so the business remains up and running— can drive dramatic gains in competitive advantage, customer engagement and business innovation. However, achieving the highest levels of business continuity, with zero recovery point objectives (RPOs) and recovery time objectives (RTOs), has been possible only for the largest companies and their most business-critical applications. The associated costs and complexity have simply been too much for most organizations to achieve those levels. That is no longer the case. This white paper discusses a new active/active stretched cluster technology that allows companies of all sizes to achieve the highest levels of business continuity without the costs and complexities that have typically marked thi
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Sep 27, 2019
Oggi la continuità operativa è fondamentale per qualsiasi azienda. Le imprese sono coinvolte in una trasformazione digitale profonda e si rivolgono all’IT per tutte le attività più mission-critical. I tempi di fermo possono arrivare a paralizzare l’intera organizzazione: le aziende più resilienti sono in grado di gestire i guasti tecnologici e fare in modo che l’azienda resti sempre operativa e funzionante. Garantire la business continuity, infatti, significa garantire maggiore vantaggio competitivo, maggiore coinvolgimento dei clienti e maggiore innovazione. Tuttavia, il raggiungimento di una business continuity di alto livello, con Recovery Point Objective (RPO) e Recovery Time Objective (RTO) pari a zero, è tipica delle imprese di grandi dimensioni che, proprio perché grandi, possono sostenere gli investimenti necessari e gestire la complessità associata. Per la maggior parte delle aziende, i costi di una business continuity di alto livello sono sempre risultati eccessivi. Oggi la
Tags : 
    
Pure Storage
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Discover why IBM is a leader in the Verdantix Green Quadrant Integrated Workplace Management Systems 2019. A robust IWMS is critical to the long-term success of your real estate efforts. Sign up to receive your copy of this industry benchmark. You’ll learn why IBM is at the forefront of innovation and why we’re the right choice for those seeking a flexible, configurable IWMS. Download your free report.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
The needs of your facilities and buildings can vary. IBM TRIRIGA can add value across all dimensions of a building. It can help optimize your space, improve energy usage and maintenance efforts, ensure the success of capital projects, and whip your lease accounting practices into shape. Learn the insights and benefits IBM TRIRIGA can provide you in better optimizing your organization’s space, maintenance efforts, energy usage, and more. Download this demo to learn more about each of these critical areas.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
IBM has been named a Leader in Gartner's Magic Quadrant for Data & Analytics Services. According to the report, by 2022, 90% of corporate strategies are expected to view information as a critical enterprise asset, and analytics as an essential competency. Data and analytics service providers can help leaders accelerate and transform their ability to deliver data-driven insights and innovation solutions to businesses. Get complimentary access to Gartner's latest Magic Quadrant report for Data & Analytics Service Providers.
Tags : 
    
Group M_IBM Q4'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.