Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

over the top

Results 251 - 275 of 350Sort Results By: Published Date | Title | Company Name
Published By: AON     Published Date: Aug 29, 2017
There are the obvious things that can affect your organization’s bottom line: sales performance, the economy, overhead. But here’s something you probably didn’t expect: the experience candidates have when they apply to work for your firm—that has an effect too. On Thursday, April 6th at 10AM CT, experts from Aon’s Candidate Selection and Assessment group will discuss how the creation of an incredible candidate experience can be used to foster an energizing candidate experience and how that affects desired business outcomes. Topics of discussion will include: ? The current state of the candidate experience ? How the candidate experience affects an organization’s brand and bottom line ? What candidates are looking for in the assessment process ? What a great candidate experience looks like
Tags : 
    
AON
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA
Published By: SAS     Published Date: Mar 06, 2018
“If we had done anything differently in Washington state, we would have done it faster,” said Hammersburg. “The key message is that fraud prevention – dealing with risk and program integrity – is not a cost issue, it’s a saving. When you can truly quantify the positive impact to the bottom line of a company or government agency, you shift the recognition that this is not an expense but that it’s a saving.” Some government organizations may be concerned that a rigorous program to shine a light on the underground economy will shine a brighter light on how much they didn’t know until now. Don’t let that stop you, said Hammersburg. “You have the opportunity to really get ahead of it now. Turn a risk into an opportunity going forward.”
Tags : 
    
SAS
Published By: Dell Software     Published Date: Jul 07, 2013
In this new white paper, discover the top 10 tips to get the most from SQL Server. Learn the things you need to know about SQL Server performance, and how these optimization tricks and strategies will help kick mediocre SQL performance to new heights. Get the paper today.
Tags : 
sql, server performance issues, solve problems, tips, best practices, solve challenges, technology, database management
    
Dell Software
Published By: Dell Software     Published Date: Aug 09, 2013
In this new white paper, discover the top 10 tips to get the most from SQL Server. Learn the things you need to know about SQL Server performance, and how these optimization tricks and strategies will help kick mediocre SQL performance to new heights. Get the paper today.
Tags : 
it management
    
Dell Software
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara
Published By: Polycom     Published Date: Jun 08, 2016
Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"Seeing is believing. How we connect and collaborate is changing. It’s no longer about reviewing a PowerPoint deck or a document sent out in advance in the meeting invite over a voice bridge. It’s now about collaborating and working in real time with voice, video and content sharing—as a team. Together, Microsoft and Polycom make it simple. Watch now an interactive session covering the following hot topics: How the new Office 365 Services and Skype for Business Online change the collaboration experience and reduce conferencing/communications costs. How you can turn your conference rooms and huddles spaces into productive, collaborative workspaces. Polycom RealPresence Trio and how it accommodates our 3 collaboration needs: Voice, Content and Video. How easy it is to set up and how easy it is for users to connect. How flexible your workspace transition plan can be. Don’t miss this session featuring Polycom and Skype for Business solutions experts, Peter Huboi and Jovito Salonga, for a d
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"What are the benefits of moving your phone services to Office 365? How does the Skype for Business phone experience online differ from a traditional on-prem PBX phone experience? What are the important features to consider when selecting phones for your Office 365 cloud deployment? Join Polycom voice experts Randy Wintle and Peter Huboi as they cover these topics and more in one of our most accessed on-demand webinars."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"For over a decade Polycom and Microsoft have been addressing the challenge facing businesses across the globe—how to create the next generation workplace and allow employees to truly collaborate from anywhere. The recent rollout of Office 365 by Microsoft has made the next generation workplace a reality and Polycom is the only provider of voice and video solutions built for this new environment. In this webinar, Polycom and Microsoft experts will discuss Microsoft’s new Office 365 services and how Polycom’s portfolio of enterprise voice and video products will drive collaboration across an entire organization from desktops to conference rooms and beyond. This webinar will cover the following product and industry discussions: •What you need to know about Microsoft’s new voice capabilities in Office 365 •How to outfit your organization with voice solutions that integrate natively with Skype for Business and Office 365 •How to prepare your organization for video collaboration around Sk
Tags : 
    
Polycom
Published By: Polycom     Published Date: Nov 29, 2016
Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you.
Tags : 
    
Polycom
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: Gleanster Research     Published Date: Oct 20, 2013
This research study from Gleanster "From Batch-and-Blast to Lead Nurturing: How Top Performers overcame legacy practices to embrace the new dynamics of B2B marketing." outlines how Top Performing organizations made the move to lead nurturing.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Oct 20, 2013
This research study from Gleanster "From Batch-and-Blast to Lead Nurturing: How Top Performers overcame legacy practices to embrace the new dynamics of B2B marketing." outlines how Top Performing organizations made the switch to marketing automation.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Oct 13, 2015
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs).
Tags : 
ibm, behavior data, csp, frost and sullivan, communications service providers, enterprise applications, telecom
    
IBM
Published By: Dell     Published Date: Aug 29, 2013
Virtualization helps you get the most from your investments, and is a flexible, powerful way to get things done. But what happens when you encounter problems with virtualization? Native tools aren’t powerful enough when you have questions about your virtual infrastructure and its capacity. In this new technical brief, see how you can properly size your VMs, measure VM density, find virtual infrastructure waste, measure storage latency – and more! – with a free, powerful tool. Discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with virtualization challenges. Read this technical brief today.
Tags : 
virtualization, foglight, infrastructure, vms
    
Dell
Published By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : 
mobile capture, ibm, process agility, customer service, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, cybercrime prevention, it security solutions, trusteer, security, it management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, enterprise applications
    
IBM
Published By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : 
ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
    
IBM
Published By: IBM     Published Date: May 04, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
IBM
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Published By: Esker     Published Date: Jun 29, 2017
Getting paid is a top priority for every business. However‚ with the wide variety of invoice formats used along with disputes about pricing or items delivered‚ the process of billing and collections can be a complicated affair. Learn how you can leverage Accounts Receivable (AR) Automation tools to achieve more on-time payments by reading the Institute of Finance & Management’s (IOFM) white paper‚ 8 Steps to a Customer-Centric Approach in Collections. A happy customer today is a customer that will pay! Download the IOFM white paper and discover how to move your business to the top of your customers’ payment lists.
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.