authenticity

Results 1 - 16 of 16Sort Results By: Published Date | Title | Company Name
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : 
cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity
    
Venafi
Published By: Tapinfluence     Published Date: Jul 20, 2016
Why the future of influencer marketing starts with people and relationships not popularity. Together, we studied the state of influencer marketing by surveying marketers and then separately polling influencers to get a balanced view. The insights were compelling. When compared, they were also revealing.
Tags : 
influencer marketing, content marketing, social media, marketing communications, influencers, marketers, site ambassadorships, authenticity, engagement, marketing channels, social marketing, digital influencer, digital agency, conversations
    
Tapinfluence
Published By: PGi     Published Date: Jul 03, 2018
Most large companies have already made investments in tools that make video webcasting possible. Video is the most vibrant and intimate medium that executives can use to convey information to large, far-flung internal audiences. Video helps keep employees on the same page about company branding, strategic direction, and externally-facing stories and messaging. It facilitates the transparency and authenticity that today’s employees demand. CEOs of large, global corporations are frequently the catalyst for enterprise live streaming because they know they can use it to make a powerful and personal connection with tens of thousands of remote employees—efficiently and cost-effectively. They support using technology to foster communication and transparency, leading to a more engaged, productive workforce. They recognize the power of video. And they see how engaged, satisfied employees can collectively strengthen their company’s competitive advantage and enhance their bottom line. If your CEO
Tags : 
    
PGi
Published By: Curalate     Published Date: Jan 10, 2017
Driving authenticity from dreaming to sharing. Download this guide from Curalate to learn more.
Tags : 
visual content, digital touchpoint, lifestyle content, emerging marketing, internet marketing
    
Curalate
Published By: Monotype     Published Date: Jun 29, 2017
After years spent hidden in the shadows of Millennials, Generation Z is taking over the spotlight and making some serious waves in the process. Gen Zs are the first true digital natives, born between the late 1990’s to the mid 2000’s, and only know a world with Internet access, social media and smartphones. This “YouTube generation” is tech-savvy and pragmatic, drives innovation and the way we consume media, and they’re pushing brands and marketers to catch up in the process. Like, follow, read, repeat In an era of massive information (and advertising) overload, the brand-consumer relationship is a delicate dance. One misstep and a disgruntled customer will gladly find a new partner. Thanks to a mobile-first, visually rich, social and digital world, people expect flexibility, authenticity and consistency in every single interaction with a brand. In order to keep your customers engaged and happy, look to the emerging behaviours and preferences of Generation Z as a beacon for what’s to c
Tags : 
generation z, communication, media, marketing, branding, customer engagement, digital engagement
    
Monotype
Published By: Infosys     Published Date: May 21, 2018
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the far to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
blockchain, finance, distributors, retailers, consumers
    
Infosys
Published By: Infosys     Published Date: Feb 11, 2019
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the farm to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
    
Infosys
Published By: Smarp     Published Date: Feb 22, 2019
Employee Advocacy relies on individual expertise on social media to support companies’ and individuals’ branding needs. All of this is done through content, accessible to all those who are part of the Employee Advocacy program. How exactly do Employee Advocacy and content marketing go together? There are four aspects that make Employee Advocacy highly relevant to content marketing efforts. 1. Alignment around a shared content strategy 2. Measuring Results 3. Boosting contents reach and engagement 4. Trust and authenticity
Tags : 
content marketing, employee advocacy, social media, content visibility, brand visibility
    
Smarp
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Bazaarvoice     Published Date: Nov 05, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : 
bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices, customer reviews, authemtic content, disclosure, compliance policies, social media
    
Bazaarvoice
Published By: Yello     Published Date: Mar 14, 2016
Use this guide to help you set transparent goals, create a transparent experience and adopt transparent authenticity.
Tags : 
yello, talent acquisition, transparent authenticity, recruiting transparency, recruitment marketing roi, data-driven performance metrics, roi
    
Yello
Published By: Bazaarvoice     Published Date: Oct 14, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : 
bazaarvoice, marketing, reviews, purchase intent, brand, feedback, crm & customer care, sales
    
Bazaarvoice
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq, net iq
    
NetIQ Corporation
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: Infosys     Published Date: Feb 07, 2019
Good coffee is more than just a drink - it's an art. and coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the farm to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
    
Infosys
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Search      

Add Research

Get your company's research in the hands of targeted business professionals.