company reputation

Results 26 - 39 of 39Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Jan 14, 2015
A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?
Tags : 
mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
Dyn
Published By: Rackspace     Published Date: Jan 19, 2016
TeamSourcing is a global company based in Ecuador that has become one of the leading providers of mobile content and services in Latin America. When CEO Armando Coronel founded TeamSourcing in 2002, its 5-person team was focused principally on the Ecuadorian market. Since then, TeamSourcing has grown to a team of nearly 60, and its reputation for world-class products and services has helped it expand throughout the region. TeamSourcing now does business in 10 Latin American countries, working with mobile operators in Ecuador, Peru, Chile, Guatemala, Honduras, Panama, Mexico, El Salvador, the Dominican Republic, and Colombia.
Tags : 
rackspace, openstack, teamsourcing, mobile, it management, data center
    
Rackspace
Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions
    
IBM
Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms
    
SilverSky
Published By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : 
ibm, it management, risk management, risk, risk management strategy, reputational risk, security
    
IBM
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn why it is crucial to protect against data breaches and see how you can save your company from potential risks by taking the right steps to avoid breaches and maintain your organization’s reputation.
Tags : 
data breaches, protection, video, prevent data breaches, avoid costs, security, data management
    
HP Enterprise Services
Published By: xMatters     Published Date: Aug 22, 2014
More and more IT leaders are seeing themselves as strategic business value generators for the company. According to a 2013 Ponemon Institute report on the IBM Global Study on the Economic Impact of IT Risk, top concerns among IT leaders now include maximizing employee productivity, enhancing the company’s brand value and reputation,expanding into new global markets, minimizing customer defection, maximizing customer acquisition, and increasing revenues and positive cash flow. So how do you get there? Start by developing a notification plan.
Tags : 
fatigue, communication, business, value, generators, it risk, productivity, acquisition, notification plan, it management, data management
    
xMatters
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech, data management
    
Xiotech
Published By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure — yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : 
theft, research center, c-level, okta, theft research, security, it management
    
Okta
Published By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most — even in tech, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the codes of the high-tech world would indicate that “hard” elements, such as cost, quality and efficiency, are more compelling to this audience, new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, high-tech executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they relied on most to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most when making decisions, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom would indicate that “hard” elements, such as details around cost, quality and efficiency, are more compelling to decision-makers, this new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, senior executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they primarily relied on to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Showing a softer side of manufacturing is winning over executives, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the standard manufacturing marketing approach would indicate that hard elements are more compelling, this new research suggests that the opposite is true: A significant majority of business leaders are moving to a more innate approach to decision-making, trusting their gut and relying on “soft” factors, such as company culture, reputation and level of trust, to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Dell-EUC (Dell/Intel Logo) Webinar     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC Lifecycle as a Service (PCaaS) will transform your company’s approach to IT infrastructure. We have identified three distinct employee personas representative of a modern workforce. Each persona has specific hardware needs. With remote work becoming an everyday aspect of modern business, the risks of critical data becoming compromised has increased dramatically. Loss of data can be crippling, resulting in loss of business, damaged reputation and even punitive fines. Intel Inside®. Intel i?lemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell-EUC (Dell/Intel Logo) Webinar
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee