inform

Results 276 - 300 of 4012Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: UL     Published Date: Nov 14, 2018
Dieses Dokument dient der Untersuchung der Auswirkungen von Änderungen, die sich durch die neue Ausgabe (Nr. 3) der IEC- und UL-Normen für Audio-/Video-, Informations- und Kommunikationstechnologie – Teil 1: Sicherheitstechnische Anforderungen gegenüber deren Vorgängerversionen, IEC 62368-1, Ausgabe Nr. 2 und UL 62368-1, Ausgabe Nr. 2 ergeben. Die Veröffentlichung von Ausgabe Nr. 3 der IEC 62368-1 ist für das 3. Quartal 2018 geplant.
Tags : 
    
UL
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q418
Published By: Salesforce     Published Date: Nov 09, 2018
For the second annual “State of Service” report, Salesforce Research surveyed more than 2,600 customer service professionals worldwide to discover: • How service leaders are responding to heightened customer demands • Which habits are hallmarks of top service teams • How smart tech is impacting service protocols In this report, high-performing service teams are the top 14% who rate both their service performance and performance versus competitors as excellent. See page 3 for further information on performance.
Tags : 
    
Salesforce
Published By: Salesforce     Published Date: Nov 09, 2018
The pillars that are driving a superior customer service experience are changing. It used to be that just answering a customer’s question correctly and in a somewhat timely manner would cut it — but in 2016 that’s not so. Your customers carry more devices, and are more connected, informed and empowered. Today’s ultra-smart customer demands connected, seamless interactions, experiences where they can choose the service that best suits their needs and consistently offers personalized journeys across all devices. More often than not, the future of business success often depends on whether companies can deliver on those expectations.
Tags : 
    
Salesforce
Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Protecting these virtualized environments, however, and the ever-growing amount of structured and unstructured data being created, still requires a complex, on-prem secondary storage model that imposes heavy administrative overhead and infrastructure costs. The increasing pressure on IT teams to maintain business continuity and information governance are changing how businesses view infrastructure resiliency and long-term data retention—they are consequently looking to new solutions to ensure immediate availability and complete protection of the
Tags : 
    
Druva
Published By: Lenovo UK     Published Date: Nov 09, 2018
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Mitel     Published Date: Nov 08, 2018
Travailler dans le secteur des technologies de l’information n’a jamais été aussi excitant, vu la façon dont la technologie améliore nos modes de travail et de communication au quotidien. Qu’il s’agisse des terminaux mobiles, des analyses en temps réel ou du cloud, les technologies actuelles s’adaptent parfaitement aux objectifs de l’entreprise et lui permettent d’augmenter sa productivité, de réduire ses coûts et d’améliorer le service à sa clientèle. L’ère du numérique redéfinit nos rôles en tant que dirigeants d’entreprise. De nos jours, il est indispensable de développer une plate-forme robuste proposant des solutions de communication et de collaboration simples et fluides.
Tags : 
wireless communication, audio conferencing, communications systems, video conferencing, cloud-based unified communications, enterprise voice, unified messaging, collaboration portal, business communications
    
Mitel
Published By: Mitel     Published Date: Nov 08, 2018
Pour offrir une expérience client plus personnalisée, les entreprises pourront compter sur l’allié insoupçonné que sont les machines. Des plus petits capteurs aux centres de contact utilisant l’intelligence artificielle, les technologies basées sur les machines peuvent aider les entreprises à mieux comprendre, servir et contacter leurs clients. Une récente enquête menée dans six pays et auprès de 2 500 décideurs informatiques révèle que les entreprises considèrent quasi universellement que les technologies basées sur les machines apportent une valeur ajoutée substantielle dans le cadre d’une expérience client plus personnalisée.
Tags : 
wireless communication, audio conferencing, communications systems, video conferencing, cloud-based unified communications, enterprise voice, unified messaging, collaboration portal, business communications
    
Mitel
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Cisco Meraki offers a comprehensive portfolio of cloud-managed IT solutions designed to work together to help deliver a modern network that is powerful, reliable, and easy to manage. This whitepaper discusses modern IT trends and explores how the Cisco Meraki portfolio of IT solutions work together to help deliver reliable, pervasive connectivity for the modern business.
Tags : 
    
Cisco EMEA
Published By: Oracle     Published Date: Nov 07, 2018
For many organisations, closing the books at the end of a financial period remains a time-consuming, cumbersome and stressful process with late nights for staff and seemingly endless re-checking of information. 
Tags : 
    
Oracle
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC.* This ebook explores the mobile trends that are transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage. Get those forms and approvals on those phones and tablets! Imagine NDAs, invoices, project proposals, purchase orders, time sheets, RFPs, permissions, reviews, signoffs – you know, those tiresome paper pushing processes – all accessible, transferable, reviewable, approvable, and actionable via any digital device."
Tags : 
    
DocuSign UK
Published By: Tenable     Published Date: Nov 06, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Magnetrol     Published Date: Nov 05, 2018
Tank overfill is a crucial safety concern in the petroleum industry. Failure to put adequate prevention measures in place has resulted in injuries, loss of life, and billions of dollars worth of damages worldwide. These resources were developed by the level control experts at Magnetrol to help you implement and maintain an effective Overfill Protection Plan for your terminals. Simply click on the downloads below at the Resources section to access this important information.
Tags : 
    
Magnetrol
Published By: Magnetrol     Published Date: Nov 05, 2018
U.S. Department of Energy surveys show that minor adjustments in process management can incrementally improve efficiency in commercial and heavy industries. These include pulp & paper, chemical, petroleum refining, mining and food processing where as much as 60% of their total energy consumption goes to the production of steam. The information-packed Steam Generation & Condensate Recovery Process Optimization kit from Magnetrol explains how effective instrumentation solutions can:
Tags : 
    
Magnetrol
Published By: Bluewater Learning     Published Date: Nov 02, 2018
Would you like to make better-informed decisions about where to invest your time & resources? Are you interested in gaining more insight into what is working, what isn't, & why? There is a movement towards advanced & predictive analytics in the Learning & Talent Management space. But what does that really mean? Bluewater's team of consultants & developers can help you define what analytics means for your company.
Tags : 
    
Bluewater Learning
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS
Published By: AWS     Published Date: Oct 30, 2018
Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
data, amazon, cwp, storage
    
AWS
Published By: Epicor     Published Date: Oct 29, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, retail pos, point of sale (pos) system, shopping cart software
    
Epicor
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.