Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rsa

Results 126 - 150 of 646Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Genesys     Published Date: May 10, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications.
Tags : 
genesys, frost & sullivan, communication, conversation, proactive, outbound engagement, customer experience, enterprise applications
    
Genesys
Published By: Genesys     Published Date: Aug 11, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications. Are you ready to lean how?
Tags : 
outbound engagement strategy, outbound communications, genesys, support costs
    
Genesys
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: Virgin Pulse     Published Date: Jun 02, 2017
In this report you’ll learn how to transcend workplace borders including geography, dispersed workforces and functional divides and create a Universal Employee Experience
Tags : 
employee experience, universal employee experience, engaging employee experience, positive employee experience, corporate culture, organizational culture, organizational culture, work culture, positive work culture, culture of health
    
Virgin Pulse
Published By: Intel     Published Date: May 15, 2017
Versa Networks has turned the concept of SD-WAN running on Intel® processor-based white boxes into a reality, as discussed in this solution brief. Read on to learn more.
Tags : 
software-defined wan, reduce costs, agility, wide area network, intel
    
Intel
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
That’s why we’ve taken some of the old business preconceptions – whether service specific or not - ripped them up and rewritten five new business rules, designed to debunk some time-honoured myths and help you and your organisation take a leap towards that much-feted goal of customer centricity. Read on for the new rules we recommend, maybe take those and mix them with your own, why not share them @OracleCX? At a minimum we hope these new ways of looking at business will help provoke the questions you, and others, need to ask of your organisation – in fact, we’ve included key questions that will help provoke some conversations, so you can start to build a picture of what’s going well and where there may be room for more discussion and investigation.
Tags : 
customer service, customer behavior, sla, service metrics, business outcomes, vision for delivery, digital customer
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
The past five years have marked the beginning of the “Age of the Customer,” in which technology and economic forces have put customers in control of their interactions with businesses. These businesses, hoping to understand and serve customers in a global and digital economy, are almost universally undergoing digital transformation, which involves realigning and investing in new technology and business models with a specific focus on the customer experience.
Tags : 
online customer experience, cross channel, call center agent, improving mobile, store/branch, phone service, social computing
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Red Hat APAC     Published Date: Jun 27, 2019
Red Hat® JBoss® Fuse is a lightweight integration platform that reduces the pain of connecting applications, services, processes, and devices for comprehensive and efficient solutions. JBoss Fuse includes the popular and versatile Apache Camel project, an implementation of the most commonlyused enterprise integration patterns. With integration patterns and more than 150 connectors ready to use, JBoss Fuse supports integration across the extended enterprise—including applications and services on-premise, on mobile devices, or in the cloud. JBoss Fuse is complemented by Red Hat JBoss Developer Studio for easier development of integration solutions and Red Hat JBoss Operations Networkfor monitoring of deployed solutions.
Tags : 
    
Red Hat APAC
Published By: Gigamon     Published Date: Feb 20, 2019
Pour vous conformer au RGPD, découvrez comment mieux gérer et sécuriser les données traversant votre réseau. Téléchargez ce livre blanc.
Tags : 
    
Gigamon
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
These days, everyone knows people use multiple channels for shopping, researching products, and communicating with friends and colleagues. Marketers have responded by using a variety of channels to communicate their message. In fact 55% of marketers use at least 10 channels within their marketing channel-mix according to the findings of recent Aberdeen research. The facts are: Utilizing multiple channels has become the ‘new normal.' Simply adding yet another channel within the channel-mix is not enough for marketers to differentiate their business. Instead, savvy marketers distinguish themselves by orchestrating campaigns across all channels to deliver truly personalized and consistent conversations. Download this guide to learn the business value marketers derive by mastering orchestration of omni-channel marketing campaigns. It’ll also reveal several building blocks marketers must use to achieve superior results.
Tags : 
    
Oracle Marketing Cloud
Published By: Dell SB     Published Date: Jan 24, 2019
The sections below contain relevant information about the key points of our PowerEdge server portfolio. Please use these to guide your conversations with prospects from introduction through to opportunity qualification and follow-up.
Tags : 
    
Dell SB
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
    
Rackspace
Published By: Workday DACH     Published Date: May 01, 2019
"Die meisten Unternehmen betrachten Finanzen und HR als unterschiedliche Bereiche. Eine Trennung, die vielfältige Probleme verursacht. Die Überführung von Finanzen und HR in ein einziges System macht es einfacher, das Gesamtbild zu sehen, Änderungen vorzunehmen und das Wachstum zu planen. Lesen Sie unser aktuelles Whitepaper und erfahren Sie im Detail acht gute Gründe, warum eine kombinierte Finanz- und HR-Lösung der bessere Weg ist."
Tags : 
financiën, workforce-technologie, digitale strategie
    
Workday DACH
Published By: SAP EMEA Global     Published Date: Dec 06, 2017
In an era of morphing business models, and even fundamental shifts in the way capitalism is practiced around the world, no universal formula can guarantee a CFO’s success. Every country, every sector, and every organization dictates its own parameters for how an individual finance function operates. Nevertheless, our research demonstrates a clear correlation between strong finance leadership and strong enterprise performance— regardless of geography, industry, or company size.
Tags : 
finance, performance, efficiency, risk management, productivity, banking, retail, consumer products, utilities
    
SAP EMEA Global
Published By: HERE Technologies     Published Date: Aug 08, 2019
On-demand webinar published by eMarketer Marketers are using more location data than ever, but consumer privacy concerns and an evolving regulatory landscape have raised new challenges. There is a need for more consideration and transparency about collecting and using geolocation. Watch this webinar to learn about: • The various ways marketers are using location data today • How consumers feel about location sharing • How new government regulations may impact data collection Besides the two eMarketer Analyst, Hervé Utheza, Head of Media, Advertising & Telco at HERE Technologies joins the conversation and gives valuable insight on how to improve campaign performance through real world geometry. View the webinar now on demand.
Tags : 
    
HERE Technologies
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation, security, it management
    
Kaspersky Lab
Published By: iPass     Published Date: Aug 28, 2008
Read this whitepaper now to learn all about 4G. New technologies, benefits and features of 4G will all be discussed in this white paper. Read now if you are considering future 4G deployment and find out how iPass can help!
Tags : 
ipass, mobile, broadband, wimax, iptv, fourth-generation, ip-based architecture, ofdma, cdma, virtual collaboration, gsm, umts
    
iPass
Published By: Bazaarvoice     Published Date: Oct 15, 2012
Our survey of 100 members of The CMO Club reveals most CMOs gather insights from first-person, always-on online consumer conversations, and share them across their organizations, to power more than just marketing.
Tags : 
bazaar voice, social marketing, social data, research, social data, marketing data, consumer awareness
    
Bazaarvoice
Published By: Esker     Published Date: Dec 18, 2015
Read our eBook, The Great SAP Order Processing Predicament, to learn how 100% electronic order processing can be achieved via one universal automation platform.
Tags : 
esker, sap order, processing predicament, electronic order processing, universal automation
    
Esker
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.