broad

Results 576 - 600 of 603Sort Results By: Published Date | Title | Company Name
By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
     NAVEX Global
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Drillinginfo     Published Date: Nov 20, 2015
OFS companies in and around the Marcellus Play need fast, accurate rig intelligence from one comprehensive source to stay competitive. With Drillinginfo (DI) you’ll gain an edge in the Marcellus Play by using the best data and the broadest intelligence available. Tracking prospects can be a lucrative opportunity, but since rigs move on a daily basis it’s important to have updated information. Learn how DI can drive a company’s success by gathering up-to-the-minute rig intelligence from a single, comprehensive software solution. The Marcellus Shale is seeing an increase in drilling every day, and with Drillinginfo you’ll have the products and solutions to help gain an edge on everything from permitting and leasing information to rig locations and pricing trends. Is your oilfield service team working from the right playbook? Find out how to get the most accurate, timely drill-site and well event information while making the most out of each and every opportunity.
Tags : ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
     Drillinginfo
By: CradlePoint     Published Date: Sep 04, 2014
Whether your businesses are connected to the Internet via T1/T3, DSL or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is a loss in connectivity via your wired line. With CradlePoint routers as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment. Please download the whitepaper to learn more!
Tags : cradlepoint, business continuity, dsl, internet service, t1 or t3 line, distributed enterprises, storage
     CradlePoint
By: AdRoll     Published Date: Dec 20, 2017
There is a great misconception that the purpose of attribution modelling is to arrive at a singular, concrete truth; however, the reality is much more nuanced. Attribution modeling is actually an ongoing process of improving how we measure marketing’s impact in order to improve our decision making over time. There are a number of attribution principles that still confuse marketers: Why is attribution a process and not an end state? Why is making small steps forward really better than doing nothing? Why does the perfect attribution model not exist? What makes attribution an ROI investment and not a cost center? With the many attribution myths, challenges, and philosophies in mind, AdRoll and Econsultancy have partnered for a second year in a row to produce The State of Marketing Attribution 2017. This time around we’ve broaden our focus beyond Europe to include content that also covers North America and Asia-Pacific.
Tags : marketing attribution, attribution modeling, roi, attribution
     AdRoll
By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : iot, iot security, iot endpoint security
     Great Bay Software
By: NetApp     Published Date: Mar 05, 2018
Did you know that by 2020, 50% of analytic queries will be generated using search, natural-language processing or voice, or will be automatically generated? Read the Gartner report Technology Insight for Modern Analytics and Business Intelligence Platforms and find out how to meet the time-to-insight demands of today's competitive business environment. Learn how to: • Determine when to use existing, traditional BI technologies versus modern analytics and BI • Broaden data access beyond relational systems • Adopt new approaches to data modeling
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: IBM     Published Date: May 22, 2015
In this webinar, we will discuss the broad range of IBM deployment approaches that can help organizations solve their business challenges and achieve a higher ROI from analytics.
Tags : analytics, roi, management, ibm, strategy
     IBM
By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
     MobileIron
By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : unitrends, microsoft office 365, backup, recovery, data loss, it management, enterprise applications
     Unitrends
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: IBM     Published Date: Sep 30, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : ibm, security, fraud prevention, technology, loss reduction, fraud, fraud management, enterprise applications
     IBM
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
     CA Technologies
By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
     IBM
By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
     IBM
By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
     IBM
By: Broadsoft     Published Date: Apr 04, 2017
It’s easy to feel overwhelmed by information, messages and notifications from workplace apps that don’t talk to one another. This disjointed technology disrupts our workflow, and we lose our momentum.
Tags : 
     Broadsoft
By: FICO     Published Date: Jun 14, 2017
The car industry’s fortunes play an important part in the stability of the broader economy. Consumers shopping for and financing a new or used vehicle have more choices than ever before. Empowered by digital delivery channels such as self-service and mobile, individuals are now able to rapidly choose and the vehicle and loan that best fits their needs.
Tags : 
     FICO
By: Juniper Networks     Published Date: Aug 10, 2017
A Scalable Data Center Network for the Data Tsunami Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : digital transformation, virtual infrastructure, network, data, automation, security, nemertes
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
     Juniper Networks
By: Wasabi     Published Date: Oct 20, 2017
The Kim Komando Show, the largest weekend radio show in the United States, with an estimated reach of 6.5 million listeners, uses Wasabi hot storage for costeffective, fast and reliable data protection for its business-critical multimedia content. Wasabi’s cloud storage service extends the broadcaster’s on premises networkattached storage (NAS) investments and eliminates the hassles and inefficiencies of tape-based data backup and recovery solutions.
Tags : wasabi, data protection, multimedia, recovery solutions, disaster recovery
     Wasabi
By: Insight     Published Date: Nov 16, 2017
Enterprises around the world are confronted with new challenges driven by a workforce undergoing massive change on both cultural and technological fronts. Today’s workforce offers the potential to bring together five generations of workers within one company, including “digital natives” — those exceptionally comfortable with the rapid changes occurring across technology. This new, broad workforce is not only powerful in size, but also in its demand for new ways of working.
Tags : workforce management, enterprise it, insight managed office, device procurement, software licensing, cloud-based services
     Insight
By: Domino     Published Date: Apr 06, 2018
Domino provides a broad portfolio of innovative industrial coding and marking solutions developed in collaboration with customers in food and beverage, life sciences, manufacturing and other industries. Beyond delivering the latest printing technologies and Industry 4.0 connectivity, Domino brings four decades of knowledge and expertise to help companies maximize productivity and OEE with agility to meet the changing needs of today’s fast-paced world. Domino is more than a mark. Domino printing technologies include thermal transfer overprinting, thermal ink jet, continuous ink jet, print-and-apply labeling, large character inkjet and laser.
Tags : domino, food, beverage, manufacturing, customers
     Domino
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com