oss

Results 51 - 75 of 4370Sort Results By: Published Date | Title | Company Name
By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
With the rise of Office 365, IT departments are under pressure to adapt their security posture to protect the new ecosystem. But with a range of security concerns standing in the way of full adoption, teams are rushing to supplement Microsoft's out-of-the-box security with more robust third-party solutions. Download our whitepaper to find out which Office 365 security concerns are keeping your IT peers up at night – and how they're overcoming them to enable greater collaboration and agility across their businesses.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
When it comes to connecting remote offices and employees, traditional distributed networks can't handle the new wave of cloud-based applications that are driving increasing speed and innovation across the enterprise. If you want to make sure that your network resources are being used more efficiently, this eBook will show you how using direct-to-cloud connectivity and scaling site-to-site with on-demand VPNs can reduce downtime and decrease complexity—ultimately saving you money.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
With the rise of Office 365, IT departments are under pressure to adapt their security posture to protect the new ecosystem. But with a range of security concerns standing in the way of full adoption, teams are rushing to supplement Microsoft's out-of-the-box security with more robust third-party solutions. Download our whitepaper to find out which Office 365 security concerns are keeping your IT peers up at night – and how they're overcoming them to enable greater collaboration and agility across their businesses.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
     Forcepoint
By: Motorola Solutions     Published Date: Jun 05, 2019
THE TIME IS NOW TO CREATE AN ENGAGING SHOPPING EXPERIENCE FOR EVERY CUSTOMER. In the world of retail, the customer is always right. That’s why retailers today must ensure their staff is well-informed, well-coordinated, armed and ready with the right information to satisfy customers in stores. Whether it’s a customer’s question about a product or a request for a different size, shoppers expect retail associates to be empowered with accurate answers and attentive service. Above all, stores need to rely on strong communication technologies so retailers can deliver a seamless experience for shoppers and keep them coming back. When retailers create an engaging experience, customer interactions turn into transactions and occasional buyers turn into loyal brand advocates. Motorola Solutions Two-Way Business Radios are helping retailers across the nation enhance customer and employee interactions, efficiency and safety both in stores and warehouses – but which business radio model is right for
Tags : 
     Motorola Solutions
By: Workday UK     Published Date: Apr 25, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
     Panasonic
By: Infosys     Published Date: Jun 14, 2019
Introduction Cloud along with other technologies such as Big Data, Internet of Things, Artificial Intelligence and Blockchain have made it possible for enterprises to have bolder visions for the future. The new technologies motivate them to accelerate tier digital transformation journey and deliver more rewarding experiences to clients.
Tags : 
     Infosys
By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
     Infosys
By: Shell     Published Date: May 28, 2019
Contamination can have a dramatic effect on the life and effectiveness of equipment, resulting in increased wear rates and damage, loss of equipment reliability and reduced component efficiency. As equipment continues to become more complex, and manufactured with tighter clearances, system contamination is increasingly important to control maintenance costs and improve equipment reliability.
Tags : 
     Shell
By: Citrix Systems     Published Date: Jun 04, 2019
Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: Why a holistic security approach is crucial What a new security approach looks like How Citrix solutions provide security across your entire stack
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Help your teams be even more productive. By giving them a secure, reliable connection with high-definition access to the apps and data they need, they'll be able to keep projects moving forward seamlessly — even across low bandwidth or high-latency networks. What's more, IT will be able to manage it all efficiently. Download our white paper. You'll discover how Citrix Workspace offers a high-definition (HDX) virtualized experience that rivals that of a local PC, and: Decreases your demand for bandwidth Increases your user density per hosting server Supports voice, video, and display—even 3D professional graphics!
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Learn how a digital workspace can help you: Deliver the apps and data people need to be productive Improve performance with unified analytics Unify access to apps across hybrid environments Get this e-book that explains how a digital workspace can simplify IT while delivering the experience your employees expect.
Tags : 
     Citrix Systems
By: FICO EMEA     Published Date: May 31, 2019
The telecommunications market is highly saturated. In most of the developed world, nearly everyone who wants a mobile phone has one. There are opportunities for carriers to increase service usage or upsell customers on higher-value devices or services, but each new account generally comes at a competitor’s expense—so customer retention is crucial. Telecom service providers need to reduce losses, prevent churn and maximise revenue on their offerings. FICO’s Best Next Action™ technology can be an important tool to achieve all of these objectives, either by presenting new offer terms or cross-selling other products and accessories to enhance the customer’s telecommunications experience—the handset upgrade, better financing terms, insurance on the handset or a subscription service for content. o Prevent account churn o Optimise service utilisation o Segment accounts o Tailor the contact method to the account
Tags : telecommunications, advanced analytics, telco, customer retention
     FICO EMEA
By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : csp, advanced analytics, telco, improve credit risk, reduce fraud loss
     FICO EMEA
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jul 13, 2009
Enterprise content is growing at an average rate of 200% per year-and the risks of noncompliance are growing even faster. This paper examines the business and technical difficulties of managing content from disparate systems and presents the most viable alternatives for addressing these challenges.
Tags : asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Aug 08, 2008
Business runs on content and that content must be managed holistically, across the entire business. However, managing content is, in itself, not enough to drive business. Enterprises must incorporate ECM with other IT management systems to provide complete Business Service Management (BSM).
Tags : asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence
     ASG Software Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com