property app

Results 1 - 20 of 20Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Intellectual Property (IP) is the life-blood of your Aerospace & Defense business. It’s the product designs that required thousands of man-hours and millions of dollars to create, or the 10-year strategy overviews that can give a competitor a huge advantage. The stakes for safeguarding IP within the Aerospace & Defense industry are at an all-time high, given the costs, complexity and potential military applications of their products. Read this White Paper to learn how you can secure and manage your IP by implementing the right strategy.
Tags : 
intellectual property, aerospace, defense business, product design, security
    
Dassault Systèmes
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience, deliver, access, app, cost, management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
    
Citrix Systems
Published By: Sage     Published Date: Oct 14, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Published By: Sage     Published Date: Jan 30, 2015
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, interactive customer experience, hr perspective, intellectual property
    
Sage
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape
    
Cyveillance
Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: SAP     Published Date: Apr 14, 2011
Discover how publishers, newspapers, studios, and broadcasting companies are using SAP solutions to automate the processes involved in acquisition and exploitation of content assets. They can accurately capture rights and effectively manage royalty processing for higher profits and better relationships.
Tags : 
intellectual property, contract management, rights availability, visibility, digital media content, rights management, content, royalties
    
SAP
Published By: 2ergo     Published Date: Apr 09, 2010
With close to 40 million smartphone owners and more than 3 billion applications downloaded, the potential of smartphone applications as brand builders and money makers is real! 2ergo's experienced team serves as the first choice for leading brands looking to launch smartphone applications, and we are ideally positioned to help you integrate mobile applications as part of your overall digital marketing strategy.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps, property app
    
2ergo
Published By: 2ergo     Published Date: Apr 09, 2010
When Rightmove wanted to be the first to provide an innovative and engaging mobile app that would move millions of iPhone users to access extensive property search functionality, they turned to 2ergo. Learn about the challenges Rightmove faced, the solution 2ergo provided, and the unbelievable results that were achieved, including how the app ultimately ranked in the top 30 Apple "Best Apps of 2009" chart.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps, property app, mobile marketing
    
2ergo
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: RuleStream     Published Date: Aug 21, 2009
The ability to harness intellectual property and product know-how is a key to competitive advantage. RuleStream appears to have broken through past technological barriers in rules-driven knowledge capture and reuse.
Tags : 
product development, market intelligence, business intelligence, competitive, business process automation, business process management, bpm, bpa, rulestream
    
RuleStream
Published By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Search      

Add Research

Get your company's research in the hands of targeted business professionals.