Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

strengthen

Results 176 - 196 of 196Sort Results By: Published Date | Title | Company Name
Published By: GoToTraining     Published Date: Apr 06, 2011
Watch this on-demand webinar with social media expert Tom Bunzel and discover how you can employ the new Internet tools to strengthen your e-learning and presentation initiatives.
Tags : 
citrix gototraining, social media training, e-learning, presentation training, webinar, tools of engagement, tom bunzel, twitter
    
GoToTraining
Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
It is often said that a chain is only as strong as its weakest link. The corollary is also true-adding an ostensibly strong link to a weak chain doesn't necessarily deliver much tensile value. Yet, from all the rhetoric and hype, you might be forgiven for thinking that solid-state storage will single-handedly strengthen every weak storage chain, wherever the solid-state storage is and however it is used. Specification-based strength added to a weak chain will soon be exposed in the real world, whether it's a tug-of-war team or a storage system.
Tags : 
hp 3par storage, storage value chain, solid state, optimization, ssd, enterprise storage, i/o service, adaptive optimization
    
HP and Intel® Xeon® processors
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp
    
Confident Technologies
Published By: Deliver     Published Date: Jul 25, 2011
How decoupling creative and production in digital marketing generates higher ROI, strengthens brands and produces competitive advantage through increased efficiency and effectiveness.
Tags : 
creative, production, digital marketing, decoupling, increased efficiency and effectiveness
    
Deliver
Published By: Workday     Published Date: Jul 30, 2019
This whitepaper from Human Resource Executive® explains why businesses need to adopt robust diversity and inclusion (D&I) strategies or risk being left behind. Read now to learn how D&I initiatives enable you to strengthen your culture while boosting your bottom line.
Tags : 
    
Workday
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
Find out how to use our Facebook Timeline best practices to help your organization build an effective social media strategy, strengthen relationships with your brand's community and see your ROI on your Facebook campaign.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, facebook strategies
    
uberVU via HootSuite
Published By: ExtraHop     Published Date: Jul 25, 2013
Practice Fusion, the leading provider of web-based electronic medical records, used ExtraHop to improve collaboration between its Development and Operations teams. “We’re not just remediating problems faster, but preventing problems from occurring in the first place,” says John Hluboky, VP of Technical Operations.
Tags : 
collaboration, storage, technology, extrahop, best practices
    
ExtraHop
Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach
    
Varonis
Published By: IBM     Published Date: Jul 29, 2014
This white paper will discuss key tips for improving a release process and strengthening release management. Once the following practices are in order, the process can be enabled to keep up with the pace of Agile, and reduce the risks associated with rapid deployments.
Tags : 
ibm, ibm urbancode, release management, release process, deployments, rapid deployment, agility, application releases
    
IBM
Published By: GuideSpark     Published Date: Nov 19, 2018
Successful executives are increasingly recognizing that effective compensation communication is essential to strengthen the employee value proposition (EVP) and make it easier for employees to understand it. As a result, they’re creating communication strategies that connect the dots between performance and pay in ways that build trust and engagement, transform the workplace culture, and help drive productivity.
Tags : 
    
GuideSpark
Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS
Published By: Evariant     Published Date: Jul 02, 2018
When call center agents don’t have access to an EMR, consumer demographic, sociological and other data, nor an understanding of marketing campaigns, agents are inefficient, reactive and unable to personalize interactions with patients and consumers. The disjointed call center experience harms the health system’s ability to find, guide, and keep patients for life. The call center is often the first touch for many prospective healthcare customers, and Scripps Health recognized these challenges. They made the pivot from call center as cost center to strategic lynch pin in their patient experience strategy. Call center agents are now delivering a world-class patient experience as they provide physician referrals, take class registrations, and serve as a clearing house for general information . An added bonus of the shift is they can now integrate outbound calling into campaign efforts, and measure the full impact of marketing efforts and strengthen marketing’s ROI. Get your free copy of
Tags : 
call center, conversions, health, proactive
    
Evariant
Published By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
    
DigiCert
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.