revealed

Results 26 - 50 of 93Sort Results By: Published Date | Title | Company Name
By: Location3     Published Date: Oct 07, 2019
The Association of National Advertisers revealed in an independent study that several agency powerhouses were marking up media inventory 30-90% on top of the fees they were already charging. These practices combined with highly publicized data breaches have contributed to an increasingly contentious environment surrounding agencies and the brands they work with directly. This white paper examines how brand marketers and corporate teams can identify potentially harmful practices undertaken by their vendors, while also offering tips for brands and franchisees to make sure they’re getting the most value out of their agency partnerships. Key Takeaways Include: Identifying Non-Transparent Marketing Fees Tips for Assessing the Value of Your Marketing
Tags : 
     Location3
By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : threats, applications, cybercriminals
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
     F5 Networks Inc
By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
     CA Technologies
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.
Tags : security, analytics, incidents, ecat, logs
     EMC Corporation
By: Oracle     Published Date: Apr 17, 2017
Our latest study, Agile Finance Revealed, looks to identify the traits of agile finance leaders and benchmark their success in creating a dynamic new operating model that is resilient, responsive, and predictive – enabling finance to lead digital transformation – not just react to it. At Oracle, we believe that digital transformation brings companies into the future, and it enables them to be more competitive.
Tags : 
     Oracle
By: Oracle     Published Date: Jul 31, 2017
An agile finance operating model is emerging that enables finance to better support digital business models and new ways of working. New research from the American Institute of CPAs (AICPA) and Oracle uncovers the traits of agile finance leaders and the strategies you need to build a modern finance operating model able to drive innovation and success in today's digital economy.
Tags : 
     Oracle
By: ServiceNow     Published Date: Jul 09, 2015
ServiceNow surveyed nearly 1,000 managers in the US and the UK to understand the effectiveness of the tools and processes in their corporate environment. Results revealed nearly two days a week are spent on administrative tasks that are not core to their jobs. There’s an exponential impact on an organization’s top and bottom lines as employees have less time to do their jobs and it takes more people to complete the job. Learn about how your organization can overcome the obsessive use of email and spreadsheets to get real work done.
Tags : 
     ServiceNow
By: IBM     Published Date: Jan 30, 2017
This white paper highlights factors that have a decisive influence on the design and effectiveness of employee engagement programs. The results revealed in this study help to ensure future engagement programs are implemented even more successfully. Through successful engagement programs, the HR department can better position itself as a strategic partner of company management and ensure HR has an influence.
Tags : ibm, employee engagement, engagement, employee voice
     IBM
By: Group M_IBM Q2'19     Published Date: May 28, 2019
In our always-on, always-connected world, healthcare consumers expect instant access to customer service, not just from 9 AM to 5 PM. It’s often no longer good enough for health plans to staff call centers during standard business hours. Members today typically want to be able to log in and help themselves to the answers they need from self-service channels whenever they want — and they want the experience to be highly personal. One contact center benchmark study (see next page) revealed self-service channels can be a win-win for both businesses and consumers.1 When done well, self-service solutions can help businesses improve customer satisfaction while reducing costs. And consumers appreciate the convenience of getting answers quickly and efficiently.
Tags : 
     Group M_IBM Q2'19
By: Epicor     Published Date: Apr 05, 2017
Today’s financial professionals have access to robust tools that offer a detailed picture of a company’s success in real time. With dashboards reporting in-depth data, a CFO can merely glance at a computer to analyze how well the business is doing in key areas. Despite the impressive technology available today, many businesses have yet to make a change. In a survey of 1,500 finance professionals, nearly half reported relying on gut instinct rather than hard data to make important business decisions. The survey—commissioned by Epicor and conducted by Redshift Research Ltd.—also revealed that a majority of CFOs and financial decision-makers are still relying on spreadsheets to interpret business data. In our “Instinct Meets Insight” eBook, you can explore the survey results and learn how a modern financial IT infrastructure lets decision-makers back up instinct with relevant data they can use to help their businesses grow.
Tags : erp software, enterprise resource planning software, digital disruption, manufacturing erp
     Epicor
By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : employee habits, corporate it systems, dropbox, it infrastructure, security, it management, enterprise applications
     Nasuni
By: Dotmailer     Published Date: Nov 06, 2018
This year’s Hitting the Mark showcased the email and customer experience tactics of 100 global brands. The report revealed both the triumphs and pitfalls of marketers as they bid to foster everlasting relationships from the inbox to the counter. This guide draws inspiration from the winning tactics adopted by brands big and small. Implement these now and you could come up top in next year’s Hitting the Mark.
Tags : 
     Dotmailer
By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
     XpertHR
By: NAVEX Global     Published Date: Dec 07, 2017
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme, including: Does our culture support employees who raise concerns? Are our communications with employees reaching the intended audiences and having the desired effect? Are our investigations thorough and effective? Do we need more training? Do we need to review or update our policies? Do employees know about our reporting channels? Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. This year’s analysis of our EMEA & APAC data from nearly 14,000 ethics and compliance hotline reports revealed key data points that compliance professionals can use to benchmark and assess their programme’s performance, and move toward predictive risk mitigation.
Tags : navex, ethics and compliance software, hotline data, risk mitigation, incident management systems
     NAVEX Global
By: ShoreTel     Published Date: Jun 05, 2013
This white paper discusses the benefits of researching the total cost of ownership for a UC system and how businesses can lower their total cost of ownership (TCO) by selecting a simple yet sophisticated solution.
Tags : unified communications, tco, total cost of ownership, uc solutions
     ShoreTel
By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
     HP - Enterprise
By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
     Entrust Datacard
By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
     McAfee
By: MuleSoft     Published Date: Jul 06, 2017
DevOps has become not only trendy, but an important rethink of the IT culture at many organizations. And with good reason the benefits to adopting DevOps are well-documented. A recent study, conducted by Utah State University and sponsored by Puppet Labs, revealed that DevOps practices can boost IT performance and ultimately improve a business’s bottom line.
Tags : it culture, it performance, customer, experience
     MuleSoft
By: ServiceNow     Published Date: Oct 11, 2017
ServiceNow commissioned Intergram Online Research Services to survey 200 senior managers in customer service roles at U.S. firms with at least 500 employees to rate their customer service approaches. The analysis of the results revealed three characteristics that separate the companies with the very best customer service from those that struggle.
Tags : 
     ServiceNow
By: The Relational Capital Group     Published Date: Nov 17, 2011
Groundbreaking research in customer behavior has revealed that the way humans respond to brands is simply an extension of the way they instinctively perceive, judge and behave towards one another. That insight could revolutionize your brand strategy.
Tags : brand, loyalty, customer, crm, retention, research, warmth, competence, relationship, purchase intent, fiske, princeton, tylenol, relational capital group, consumer behavior, psychology, product recalls, malone, kervyn, social media
     The Relational Capital Group
By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security
     MX Logic
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com