boardroom

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing, remote video conferencing, video conferencing software, boyd video conferencing, video conferencing applications
    
Arkadin
Published By: BlackLine     Published Date: May 24, 2018
Digital transformation is the new boardroom buzzword. But what does this really mean for finance teams, and why does it matter? Beyond the hype, real change is underway.
Tags : 
    
BlackLine
Published By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : 
video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources
    
Blue Jeans Network
Published By: Cisco Systems     Published Date: Jun 05, 2013
Innovative Uses of Telepresence
Tags : 
telepresence, transformative technology, in-person, innovative, boardroom, collaboration
    
Cisco Systems
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
The purpose of this article is to provide the reader with several key insights that can better prepare your organization for mitigating security breaches
Tags : 
    
Concerto Cloud Services
Published By: Destination Analytics     Published Date: Apr 06, 2012
Organizations that take a wait-and-see approach to analytics are falling behind their more determined peers. Read to find out more.
Tags : 
ibm, technology, netezza, analytics, enterprise analytics
    
Destination Analytics
Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert
Published By: Diligent     Published Date: Aug 05, 2016
This whitepaper reveals some of the most commonly asked questions about board portals and how they can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portals, boardroom, sharing information, information management
    
Diligent
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: Infosys     Published Date: May 21, 2018
The digital revolution has left no part of business untouched. The traditional world of CFO's is evolving fast - not only because technology enables them to perform their duties more effectively, but also because the next generation of CFOs are steadily making their way into the boardroom. And they are going to drive change even faster. This was an issue that was high on the agenda for our client, one of the world's largest multinational conglomerates. They could see that CEO's of the group's businesses were relying increasingly on the financial insight of their CFOs to help shape business direction strategy. CFOs, therefore, need to ensure that they are equipped with technology and data to fulfill this new and demanding role.
Tags : 
millennial, cfo, finance, business, technology
    
Infosys
Published By: Kaseya     Published Date: Apr 04, 2013
The role of the CIO is suffering. Take back your place in the boardroom by transforming IT from an operational entity to a more strategic, revenue-generating role within the organization.
Tags : 
cio, strategy, revenue, roi, business goals, job roles
    
Kaseya
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing
    
LockLizard
Published By: mavisliew     Published Date: Feb 04, 2015
In this whitepaper, you’ll find some practical advice on how you can demonstrate your value to the C-suite and gain that all-important seat at the boardroom table.
Tags : 
    
mavisliew
Published By: mavisliew     Published Date: Feb 18, 2015
In this whitepaper, you’ll find some practical advice on how you can demonstrate your value to the C-suite and gain that all-important seat at the boardroom table.
Tags : 
    
mavisliew
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity
    
Palo Alto Networks
Published By: Polycom     Published Date: Dec 18, 2014
To remain significant in an increasingly digital information driven world, IT leaders need to drive tangible business value. Dr Carsten Sørensen, Associate Professor in Digital Innovation at The London School of Economics and Political Science, outlines how IT is no longer confined to being a support function but is becoming business critical across all departments.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital, information, marketplace, infographic, global, trends
    
Polycom
Published By: Polycom     Published Date: Jun 08, 2016
"Over the years, the features, functions, and capabilities offered by group video conferencing systems have expanded and evolved. And the requirements and expectations of collaboration users have changed along with them. This 2016 Buyers Guide helps end users understand the features and functions needed to collaboration-enable five of the most common spaces found in enterprises of all sizes; - small (huddle) rooms - teaming spaces - standard meeting rooms - executive boardrooms - reconfigurable (and perhaps divisible) spaces Download the ""2016 Buyers Guide: Making Smart Group Video Collaboration Decisions"" by Wainhouse Research that will help you make informed decisions regarding your video collaboration strategy."
Tags : 
best practices, budget, business optimization, business management, collaboration
    
Polycom
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.