authenticity

Results 1 - 16 of 16Sort Results By: Published Date | Title | Company Name
By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity
     Venafi
By: Tapinfluence     Published Date: Jul 20, 2016
Why the future of influencer marketing starts with people and relationships not popularity. Together, we studied the state of influencer marketing by surveying marketers and then separately polling influencers to get a balanced view. The insights were compelling. When compared, they were also revealing.
Tags : influencer marketing, content marketing, social media, marketing communications, influencers, marketers, site ambassadorships, authenticity
     Tapinfluence
By: PGi     Published Date: Jul 03, 2018
Most large companies have already made investments in tools that make video webcasting possible. Video is the most vibrant and intimate medium that executives can use to convey information to large, far-flung internal audiences. Video helps keep employees on the same page about company branding, strategic direction, and externally-facing stories and messaging. It facilitates the transparency and authenticity that today’s employees demand. CEOs of large, global corporations are frequently the catalyst for enterprise live streaming because they know they can use it to make a powerful and personal connection with tens of thousands of remote employees—efficiently and cost-effectively. They support using technology to foster communication and transparency, leading to a more engaged, productive workforce. They recognize the power of video. And they see how engaged, satisfied employees can collectively strengthen their company’s competitive advantage and enhance their bottom line. If your CEO
Tags : 
     PGi
By: Curalate     Published Date: Jan 10, 2017
Driving authenticity from dreaming to sharing. Download this guide from Curalate to learn more.
Tags : visual content, digital touchpoint, lifestyle content
     Curalate
By: Monotype     Published Date: Jun 29, 2017
After years spent hidden in the shadows of Millennials, Generation Z is taking over the spotlight and making some serious waves in the process. Gen Zs are the first true digital natives, born between the late 1990’s to the mid 2000’s, and only know a world with Internet access, social media and smartphones. This “YouTube generation” is tech-savvy and pragmatic, drives innovation and the way we consume media, and they’re pushing brands and marketers to catch up in the process. Like, follow, read, repeat In an era of massive information (and advertising) overload, the brand-consumer relationship is a delicate dance. One misstep and a disgruntled customer will gladly find a new partner. Thanks to a mobile-first, visually rich, social and digital world, people expect flexibility, authenticity and consistency in every single interaction with a brand. In order to keep your customers engaged and happy, look to the emerging behaviours and preferences of Generation Z as a beacon for what’s to c
Tags : generation z, communication, media, marketing, branding, customer engagement, digital engagement
     Monotype
By: Infosys     Published Date: May 21, 2018
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the far to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : blockchain, finance, distributors, retailers, consumers
     Infosys
By: Infosys     Published Date: Feb 11, 2019
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the farm to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
     Infosys
By: Smarp     Published Date: Feb 22, 2019
Employee Advocacy relies on individual expertise on social media to support companies’ and individuals’ branding needs. All of this is done through content, accessible to all those who are part of the Employee Advocacy program. How exactly do Employee Advocacy and content marketing go together? There are four aspects that make Employee Advocacy highly relevant to content marketing efforts. 1. Alignment around a shared content strategy 2. Measuring Results 3. Boosting contents reach and engagement 4. Trust and authenticity
Tags : content marketing, employee advocacy, social media, content visibility, brand visibility
     Smarp
By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery
     Mimecast
By: Bazaarvoice     Published Date: Nov 05, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices
     Bazaarvoice
By: Yello     Published Date: Mar 14, 2016
Use this guide to help you set transparent goals, create a transparent experience and adopt transparent authenticity.
Tags : yello, talent acquisition, transparent authenticity, recruiting transparency, recruitment marketing roi, data-driven performance metrics, roi
     Yello
By: Bazaarvoice     Published Date: Oct 14, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : bazaarvoice, marketing, reviews, purchase intent, brand, feedback
     Bazaarvoice
By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : log file, data protection, log management, legal log, log data, log law, authenticated log, netiq
     NetIQ Corporation
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
     ProofSpace
By: Infosys     Published Date: Feb 07, 2019
Good coffee is more than just a drink - it's an art. and coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the farm to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
     Infosys
By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
     DigiCert
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com