strength

Results 126 - 150 of 363Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
By: NAVEX Global     Published Date: Jul 31, 2018
Learn everything you need to know about creating an engaging training programme—from defining your strategy to measuring effectiveness—in our comprehensive guide. What you'll learn: How to prevent misconduct through training How to create an engaging training programme - from defining strategy to measuring effectiveness How to develop the foundation of an ethical culture Tips, advice and examples to help organisations develop cost-effective, high-value and successful ethics and compliance training programmes How to mitigate risk and promote adherence to compliance objectives How to improve employee engagement and trust and strengthen alignment around a set of core values
Tags : 
     NAVEX Global
By: Silverpop     Published Date: Sep 19, 2011
The most successful marketers will be those who stand out by infusing their content with a more human feel. Here are five tips and tactics guaranteed to strengthen your messages and delight your subscribers.
Tags : silverpop, humanizing content, personal attention, social media
     Silverpop
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
     Centrify Corporation
By: SDL Web Content Management Solutions     Published Date: Aug 31, 2010
A leader in WCM since circa 2006, SDL arguably produces the most functionally robust enterprise platform in the industry, with particular strengths in multi-channel marketing, globalization, translation management, and brand management. Based on a heterogeneous technical infrastructure, the product can be tricky to implement, but global, enterprise-wide deployments often require the fine-grained configurability of a such a solution. Non-technical business users (online marketers in particular) seem to adopt the product readily, and they consistently give its polished user interface high marks.
Tags : sdl, web content management, magic quadrant, wcm, content, web, ecommerce, marketing
     SDL Web Content Management Solutions
By: SDL Web Content Management Solutions     Published Date: Mar 02, 2011
Today's marketing and brand management groups are on the front lines of business mandates to grow international revenue, increase worldwide market share, and strengthen the impact of global brands. Businesses reaching for such goals face an environment of unprecedented pressures. How are companies dealing with the demands of multilingual marketing?
Tags : multilingual marketing, wcm, branding, sdl, language, lob
     SDL Web Content Management Solutions
By: Epsilon     Published Date: Oct 19, 2012
Unlock the Mystery of Predictive Modeling -- Retailers that use customer transactional data to their advantage, coupled with other database elements, can learn how to build solid customer relationships and strengthen their ROI.
Tags : modeling, epsilon, marketing, marketing research, roi, transactional data
     Epsilon
By: CDW-Apple     Published Date: Dec 11, 2012
Simplify management, strengthen security, and improve productivity with managed mobile applications.
Tags : mobile applications, business mobile applications, application management, mobile it integration, mobile it
     CDW-Apple
By: Polycom     Published Date: Mar 13, 2015
As the financial services industry moves away from its historic focus—on high margin business, banking, brokerage, insurance, trading, wealth management, and payment companies—they must rethink and strengthen the ways they interact with markets and customers. Organizations that fail to provide personalized services for their clients or to satisfy increasingly demanding customers will struggle to keep their position as competitors innovate at every turn.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: Genesys     Published Date: Jul 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process 1 Gartner Peer Insights rev
Tags : 
     Genesys
By: Adobe     Published Date: Feb 13, 2018
Because you don’t just deliver content. You deliver a customer experience. We're honored that once again, we've been positioned as a leader in Gartner’s Magic Quadrant for Web Content Management (WCM). We believe this validates Adobe Experience Manager as a forward-thinking vision of what content management can be throughout an entire customer journey. And with the integration of Adobe Experience Cloud and Adobe Creative Cloud, we offer more than a content management platform. It’s a content management powerhouse. Read the report and learn about Adobe Experience Manager’s strengths according to Gartner — and how you can bring those strengths to your own customer experiences.
Tags : 
     Adobe
By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
     OKTA
By: Forcepoint     Published Date: May 14, 2019
The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more.
Tags : 
     Forcepoint
By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : data, jebbit, remarketing, audiences, omnichannel
     Jebbit
By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
     CA Technologies EMEA
By: IBM     Published Date: Oct 02, 2015
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : ibm, release management, business needs, market trends, customer demands, deploy application, best practices, it management, enterprise applications, data management
     IBM
By: Mimecast     Published Date: Nov 10, 2010
The right archiving solution can simplify and strengthen your overall email management systems and processes.
Tags : mimecast, software as a service, saas email archiving, email management system
     Mimecast
By: Citrix Systems     Published Date: Sep 06, 2013
Regain control and reduce risk without sacrificing business productivity and growth.
Tags : citrix, security, desktop virtualization, strengthen information, reduce risk, it management
     Citrix Systems
By: Citrix Systems     Published Date: Sep 06, 2013
Empowering Information Security with Desktop Virtualization
Tags : citrix, security, desktop virtualization, strengthen information, reduce risk, byod, it management, enterprise applications
     Citrix Systems
By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : citrix, information security, desktop virtualization, virtualization, it management
     Citrix Systems
By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : information security, layered approach, mobility, application, desktop virtualization
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : citrix, it security, app virtualization, desktop virtualization, app, security, enterprise applications
     Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com