Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

hie

Results 2101 - 2125 of 2381Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must take in order to achieve and maintain compliance.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Taleo     Published Date: Dec 30, 2009
Integrated Talent Management: Improving Business Results through Visibility and Alignment: Research shows the vast majority of organizations have only achieved integration across two or more elements of talent management, those that have are reporting superior performance gains.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment
    
Taleo
Published By: Taleo     Published Date: Nov 11, 2010
Check out the latest interview with Matthew Adam, Vice President & Chief Talent Strategist for NAS Recruitment Communications, and Peter Clayton of Total Picture Radio as they discuss several recruiting hot topics.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment
    
Taleo
Published By: Taleo     Published Date: Mar 30, 2012
his study of 438 organizations examines strategies, tools, and processes designed to improve engagement and performance. Best-in-class organizations achieved a larger percentage of performance reviews that exceed expectations, higher engagement, and improved employee retention.
Tags : 
employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management
    
Taleo
Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft
Published By: TD.Org     Published Date: Nov 06, 2017
Virtual classrooms are an effective and widely used learning delivery mechanism—one that today’s economically and geographically challenged talent development functions have embraced enthusiastically. ATD’s Virtual Classrooms Now: Using Technology to Reach Today’s Workforces whitepaper identifies practices that are gaining positive returns for companies achieving strong market performance and high levels of learning effectiveness. Download this whitepaper to learn what’s working in virtual classrooms today.
Tags : 
    
TD.Org
Published By: Tealium     Published Date: Jun 15, 2015
Marketing nirvana is all about driving consistent, real-time customer interactions across all digital touch points. See how Ancestry.com is using Tealium to make this long-held goal a reality.
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising
    
Tealium
Published By: TeamQuest     Published Date: Aug 21, 2012
Verizon Wireless Achieves Business Success with Problem-free iPhone 4 Launch
Tags : 
verizon wireless, teamquest, record sales, performance, iphone, customers
    
TeamQuest
Published By: TeamQuest     Published Date: Nov 14, 2014
Learn how to use IT analytics to achieve better business performance and see how crucial it is for increased efficiency and profitability.
Tags : 
teamquest, it value, it intelligence, virtualised it, it budgets, capacity management, service optimization, itso
    
TeamQuest
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Teradata     Published Date: May 01, 2015
Creating value in your enterprise undoubtedly creates competitive advantage. Making sense of the data that is pouring into the data lake, accelerating the value of the data, and being able to manage that data effectively is a game-changer. Michael Lang explores how to achieve this success in “Data Preparation in the Hadoop Data Lake.” Enterprises experiencing success with data preparation acknowledge its three essential competencies: structuring, exploring, and transforming. Teradata Loom offers a new approach by enabling enterprises to get value from the data lake with an interactive method for preparing big data incrementally and iteratively. As the first complete data management solution for Hadoop, Teradata Loom enables enterprises to benefit from better and faster insights from a continuous data science workflow, improving productivity and business value. To learn more about how Teradata Loom can help improve productivity in the Hadoop Data Lake, download this report now.
Tags : 
data management, productivity, hadoop, interactive, enterprise, enterprise applications
    
Teradata
Published By: Teradata     Published Date: Jun 12, 2013
This whitepaper details how BCBSNC leverages its Teradata environment to achieve key strategic goals.
Tags : 
big data, analytics, healthcare
    
Teradata
Published By: Teradata     Published Date: Jun 12, 2013
Health plans and insurers know that to thrive over the next 3-5 years, they must dramatically improve their ability to engage with individual consumers. The combination of Teradata products; an integrated data warehouse, Aster big data analytics and Aprimo integrated communication management, creates actionable analytic capabilities unparalleled in its ability to help companies achieve these goals. this white paper details how health plans and insurers can use Teradata to succeed in today’s healthcare environment.
Tags : 
healthcare, data, insights, health plans, integrated data
    
Teradata
Published By: Teradata     Published Date: Feb 04, 2015
How can the 21st century CMO create a cohesive, creative and streamlined marketing department that delivers a better product and message to the customer, leading to an ideal customer experience? This report aims to be a blueprint—a roadmap even—for CMOs who want to build better-integrated marketing teams, increase customer engagement and turn bigger profits, but who find that silos are a persistent, nagging barrier.
Tags : 
terada, forbes, insights, marketing, silos, roi, customer, satisfaction
    
Teradata
Published By: Teradata     Published Date: Oct 19, 2015
Bruce Rogers, Forbes’ Chief Insights Officer, will discuss the key findings from a survey of senior-level IT and data executives on big data and analytics. He will be joined by Matt Ariker from McKinsey and Chris Twogood from Teradata and together they will present the differences between "leaders" and "laggards" when it comes to analytics initiatives and share how organizations can increase their odds of success with big data and analytics.
Tags : 
big data, analytics, leaders, laggards, anlytics initiative, data center
    
Teradata
Published By: Thawte     Published Date: Oct 05, 2015
A l’heure où les consommateurs sont de plus en plus nombreux à faire leurs achats de Noël sur Internet, leurs exigences de sécurité représentent un enjeu plus capital que jamais. C’est donc maintenant qu’il faut agir. Sur le Net, un client rassuré est un client à moitié converti. Notre nouvelle infographie et notre dernier document technique vous en livre toutes les clés avant le grand rush de Noël.
Tags : 
online shopping growth, christmas shopping season, online-savvy, customer demand, online security, security
    
Thawte
Published By: Thawte     Published Date: Oct 05, 2015
SSL-Zertifikate mit Domänenvalidierung (DV), Unternehmensvalidierung (OV) und Extended Validation (EV) bieten völlig unterschiedliche Validierungsniveaus – aber was heißt das genau? Welches Zertifikat für Sie das Richtige ist, hängt von Ihrem Unternehmen ab und wofür Sie es verwenden wollen. Laden Sie jetzt unsere Kurzübersicht herutner, um zu erfahren, welches Validierungsniveau für Sie das beste ist.
Tags : 
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2015
SSL-Zertifikate mit Domänenvalidierung (DV), Unternehmensvalidierung (OV) und Extended Validation (EV) bieten völlig unterschiedliche Validierungsniveaus – aber was heißt das genau? Welches Zertifikat für Sie das Richtige ist, hängt von Ihrem Unternehmen ab und wofür Sie es verwenden wollen. Laden Sie jetzt unsere Kurzübersicht herutner, um zu erfahren, welches Validierungsniveau für Sie das beste ist.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
    
Thawte
Published By: The Ariel Group     Published Date: Jan 25, 2017
There was a time when middle managers were seen as fairly expendable. If you needed to cut costs or eliminate layers, managers were the first to get the axe. The realities of today’s environment are changing that, however. Managers are playing a pivotal role, not just in making sure key tasks get done, but in engaging employees to be more vested in the organization and motivated to contribute their best. As we keep asking people to “do more with less,” step up to new challenges, and embrace new organizational directions, managers are the ones who have the greatest opportunity to influence the actions on the front lines. They are also critical for helping organizations keep and grow top talent, a particular concern as employee disengagement and turnover rates are costing companies billions of dollars annually.
Tags : 
    
The Ariel Group
Published By: The Economist Group     Published Date: Feb 13, 2019
This paper will highlight our five key findings to achieve more successful content marketing campaigns. Brands can use these insights pre-mid-and post-campaign to maximise marketing ROI.
Tags : 
marketing, digital marketing, marketing roi, content marketing, social media marketing, lead generation
    
The Economist Group
Published By: The FeedRoom     Published Date: Mar 31, 2009
Many companies still are experimenting with different ways to use Web video in order to squeeze more efficiency out of their on-going operations. New, creative applications of the technology are emerging every day, helping organizations to achieve high returns on investment from their spending on the technology.
Tags : 
feedroom, communications, web, video, online video, emerging markets, video enhancement, outbound marketing
    
The FeedRoom
Start   Previous    78 79 80 81 82 83 84 85 86 87 88 89 90 91 92    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.