rsa

Results 126 - 150 of 575Sort Results By: Published Date | Title | Company Name
By: RSA Security     Published Date: Nov 06, 2013
See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 06, 2013
This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 06, 2013
This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Business Continuity Management Platforms based on completeness of vision and ability to execute.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC has received the highest rating of “Strong Positive” in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: RSA Security     Published Date: Nov 18, 2013
This paper will explain how to achieve a balance between risk and business agility through a comprehensive approach to Operational Risk Management.
Tags : archer, rsa, operational risk, security, technology, business agility, comprehensive approach
     RSA Security
By: BI WORLDWIDE     Published Date: Nov 18, 2015
As we head into a new year, here are the latest trends to ensure your employees get recognized at the right time - and with the right message - in an impactful way.
Tags : recruitment, retention, employee engagement, service anniversary experience, service award, service award investment, employee recognition
     BI WORLDWIDE
By: Oracle CPQ BB     Published Date: Feb 05, 2016
How much selling power are you really getting from your sales teams? Are you making the most out of your CRM investment? Companies have a universal need for revenue growth, profitability, and customer satisfaction. In hopes to satiate this need, most companies have made significant investments in sales force automation to capture sales data, increase visibility to sales pipeline, and gain business insight to make better business decisions. However, few companies can say they have fully realized the benefits they hoped to achieve from their CRM investment. Additionally, with today’s modern, informed buyer, CRM technologies need to empower sales users with better information that’s easy to find and helps them sell. Read more to learn how Oracle Configure, Price, and Quote (CPQ) Cloud extends sales automation to simplify and streamline modern quote-to-cash processes and more!
Tags : 
     Oracle CPQ BB
By: Brainshark     Published Date: Aug 02, 2017
As buyers have become increasingly more savvy and better-educated, B2B sales organizations have changed their strategies. But that can’t happen in a vacuum – sales training must change as well. This brief provides specific ways to improve both the training content delivered to sales reps and the all-important methods for delivering that content. With this actionable information, managers and trainers can begin enacting real change that gets reps more conversation-ready than ever before. Get your copy of this latest brief today. And ready your sales force for better opportunities and more wins.
Tags : sales mastery, b2b, b2b sales, salespeople, better selling, sales training
     Brainshark
By: Brainshark     Published Date: Aug 02, 2017
Whether your sales reps are 25 or 65, sales enablement leaders all have the same goal: to ensure that reps are prepared to have impactful conversations with each and every buyer. However, the preferred methods of sales coaching change from generation to generation. Thankfully, sales coaching technology helps sales enablement leaders bridge that gap. This exclusive eBook provides details on how to use technology to alter your coaching strategy to appeal to next-gen sales reps, including: • Mobile and video-based coaching • Options for both formal and informal learning • Coaching for both individual and organizational mastery
Tags : next-gen sales force, sales enablement, coaching, salesforce
     Brainshark
By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
     Lookout
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
     Lookout
By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr, continuous testing, testing effort, service virtualisation, delivery ecosystem
     CA Technologies EMEA
By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
     Carbon Black
By: Sauce Labs     Published Date: May 30, 2018
In an age where your users demand no-fail experience, continuous testing has become a mission critical component for engineering teams of all sizes. However, while this topic was once discussed at lower levels, the conversation has made it all the way to the C-suite. No matter your industry, if your team isn’t thinking about testing at a high level, then there is a chance that you are missing out on revenue due to flawed app functionality, delayed releases and slowed innovation. It is important to understand the business benefits of continuous testing and automation to avoid these outcomes, and make the changes necessary to set your applications up for success.
Tags : 
     Sauce Labs
By: Spredfast     Published Date: Nov 15, 2018
How Top Brands Automate Social Service Practices Today’s conversational commerce requires brands to provide immediate answers to their customers’ questions. Chatbots and artificial intelligence are fast becoming critical tools for customer service, bringing speed and scale that ensures a superior experience. But what are the best practices that marketers need to know to tackle the challenges of customer service automation? ?Learn from experts from General Motors, Booking.com and Spredfast about how to bring automation into your CX workflows and bolster your social service strategies. You’ll find out: How to think about automation for your business? How chatbots enhance your agent workflows?? ??How Booking.com and GM are using AI to drive inspiration and customer? service efficiencies??
Tags : 
     Spredfast
By: Group M_IBM Q119     Published Date: Feb 08, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Conversational Banking allows banks to have the best of both worlds as this always-on, personalized banking will be available at a fraction of the cost of relying on human agents alone. It is both instantaneous and personal. It feels intimate but is cost-effective. Read more to see how banks can start.
Tags : 
     Group M_IBM Q119
By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
     Amazon Web Services
By: Amazon Web Services     Published Date: Dec 01, 2017
Les informations suivantes doivent servir de ressources aux directeurs financiers qui dirigent ou assistent leur organisation tout au long de sa migration vers le cloud. Elles ont pour objet de présenter les motivations, les coûts, les risques et les avantages de l'adoption du cloud, et de soulever des questions importantes en matière d'effectifs et de technologie, qui s'avèrent essentielles à la réussite de cette adoption. Elles visent également à permettre de mener des analyses de rentabilité, en mettant en valeur des mesures et des indicateurs spécifiques aux environnements cloud, capables d'influencer les résultats. Les conseils fondamentaux qui sont fournis sont tirés de conversations et d'entretiens directs entre Amazon Web Services (AWS) et les directeurs financiers d'entreprises clientes, qui représentent un large éventail de secteurs d'activité.
Tags : planification, amazon, web, services, destine, aux, directeurs, financiers, guide
     Amazon Web Services
By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : strategy, ddos, spam, technology, solutions
     F5 Networks Inc
By: Oracle     Published Date: Nov 14, 2016
Durante mucho tiempo, distinguir las señales inmersas en una masa de datos era el privilegio de pocos. Ya no es el caso. Hoy es imposible que un pequeño grupo de personas gestione el volumen de datos disponibles, así como es imposible imaginar todas las preguntas que necesitan una respuesta.
Tags : 
     Oracle
By: Infor     Published Date: Jun 13, 2017
Las modificaciones suelen crear polémica entre muchos profesionales del sector informático de la fabricación. El término "estándar" también tiene connotaciones muy diversas, ya que se suele asociar con las antiguas soluciones genéricas para empresas que ofrecían funcionalidades rudimentarias con el pretexto de que su aplicación era muy simple.
Tags : 
     Infor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com