points

Results 201 - 225 of 746Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Oct 21, 2015
In this 30 page report they have compiled valuable tips, tricks, and techniques for streamlined and effective DLP deployments into straightforward processes to ease most common pain points.
Tags : 
mcafee, intel, security, dlp, securosis, networking, software development, knowledge management
    
Intel Security
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: IBM     Published Date: May 03, 2016
In this report you will learn how to enhance your customer relationships across all your channels and touch points, produce personalized customer offers and learn from real-world case studies across various industries.
Tags : 
ibm, ibm predictive customer intelligence, business analytics, customer relations, business technology
    
IBM
Published By: IBM     Published Date: Oct 17, 2016
Download and read this detailed “Redbook” from IBM to learn more about the capabilities and benefits you can realize from using IBM Predictive Customer Intelligence (PCI). You’ll learn how to use this sophisticated solution to enhance your customer relationships across all your channels and touch points.
Tags : 
ibm, commerce, analytics, ibm predictive customer intelligence, predictive intelligence, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 05, 2016
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies.
Tags : 
ibm, watson, leadership, internet of things, iot, knowledge management, enterprise applications, business technology
    
IBM
Published By: Genesys     Published Date: Feb 27, 2018
Modern contact centers support a variety of digital channels—email, chat, co-browsing, social, video—over multiple digital touchpoints (web or mobile devices). What they lack is the ability to link interactions in a step-by-step journey to provide a personal, contextual experience for each customer. Download this eBook. Learn how you can: • Design a successful digital customer engagement strategy • Provide agents with a 360-degree view of the customer across all digital channels and voice • Deliver omnichannel experiences that are personalized, context-based, and low-effort
Tags : 
digital customer service, contact center, digital channel, ebook
    
Genesys
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Your business relies on a Microsoft® infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is. Your users do not care where the applications and data reside; they only care about getting their job done. SharePoint®, Skype for Business, or Active Directory® deployed on the network, in Azure®, or as part of your Office 365® subscription should have no impact on the success of your business.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Sprinklr     Published Date: Feb 28, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
research reports, analyst reports, marketing technology, forrester wave, forrester wave reports, report, marketing trends. trends, marketing
    
Sprinklr
Published By: IBM     Published Date: Feb 27, 2017
Download and read this detailed “Redbook” from IBM to learn more about the capabilities and benefits you can realize from using IBM Predictive Customer Intelligence (PCI). You’ll learn how to use this sophisticated solution to enhance your customer relationships across all your channels and touch points.
Tags : 
ibm, predictive customer intelligence, pci, customer relationships, channel integration
    
IBM
Published By: IBM     Published Date: Feb 28, 2017
Energy companies are being challenged on multiple fronts. Core expectations require the delivery of safe, reliable, affordable and sustainable energy. Business models are being challenged by alternatives such as renewables and consumers demanding more sophisticated interactions through social and mobile. Energy companies need to: Disruptively innovate business processes through analytics driven operational excellence to increase agility and responsiveness, reduce operational costs and improve asset reliability Assume the role of energy integrator to optimally balance supply and demand points Deliver a 360-degree customer-of-one experience to increase customer satisfaction and loyalty, reduce costs, and improve management of energy demand
Tags : 
ibm, energy & utilities, utility trends, pov, ibm pov, customer experience, sustainable energy, affordable energy
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
The Smarter Process platform is IBM’s solution for reinventing business operations in a way that infuses every process with intelligence and expertise to deliver greater customer centricity, which in turn fuels top-line growth. It incorporates Business Process Management, Case Management, Operational Decision Management and Process Analytics, along with Process Discovery and Design with an objective of ensuring that customers find it easy to do business and that every interaction includes positive touch points. Within the context of this new imperative, accessing cloud efficiencies, leveraging mobile for greater engagement, mining big data for insights, and enhancing customer relationships via social media, are proving to be critical and interrelated strategies.
Tags : 
customer engagement, mobile, social, bpm, case management
    
IBM
Published By: Datastax     Published Date: Aug 23, 2017
The world today is interacting at every level - consumers, business customers and employees - through cloud applications, and these cloud applications are transforming customer experiences. So what is a cloud application? Any application that has many geographically distributed endpoints (e.g. browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
datastax, technology, customer experience, cloud
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Datastax     Published Date: May 15, 2018
So what is a cloud application? Any application that has many geographically distributed endpoints (e.g., browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Comdata     Published Date: Jul 05, 2017
So you’re thinking about implementing a virtual credit card program (also known as ePayables or virtual payments) or changing your current provider. This is the first step to a hopefully beautiful and successful new partnership, but how do you know which provider is the best fit? While we can’t pick your provider for you, we can offer a few important points of consideration.
Tags : 
    
Comdata
Published By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
    
Oracle + Dyn
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee