Skip to main content
 

over the top

Results 226 - 250 of 350Sort Results By: Published Date | Title | Company Name
Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution
    
xMatters
Published By: HP     Published Date: Oct 01, 2014
Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. Over the next 12 months, more than half of enterprises will prioritize building internal private clouds. Today, the most common approach is through the purchase of commercial software to layer atop existing infrastructure resources. Regardless of the approach you choose, there’s no shortage of tools to support your efforts.
Tags : 
wave, private, cloud, solutions, application, templates, catalogs, services
    
HP
Published By: WayUp     Published Date: Dec 22, 2015
There are a number of misconceptions floating around about college students that may cause employers to pass over their applications. Pop culture depicts college students as lazy, irresponsible, and unreliable, yet we have found they’re an extremely beneficial addition to any growing business. Download this whitepaper to learn the top four reasons college students are the best hires for part-time positions.
Tags : 
college students, part-time workers, part-time hires, recruitment, technology, millennials
    
WayUp
Published By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
    
HPE Intel
Published By: DocuSign     Published Date: Mar 23, 2016
In today’s digital world, paper documents are an obstacle to doing business. Implementing a Digital Transaction Management (DTM) system can help, but financial services firms need solutions that offer bank-level security, regulatory compliance, operational efficiency, and a positive end-user experience. Read the report and discover the top 10 reasons why Financial Services firms choose DocuSign for their Digital Transaction Management and esignature solution.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
The insurance industry generates nearly $2 trillion a year in revenue- yet still runs on paper-based processes. Read the report and discover the top 10 reasons why Insurance Companies choose DocuSign for their Digital Transaction Management and eSignature solution. DocuSign is revolutionizing digital transaction management for all players in the insurance sector.
Tags : 
    
DocuSign
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This eBook provides an overview of the science behind mindfulness meditation and highlights why it’s captured the attention of top executives across the globe. It’s intended for people who are not only interested in the health and performance benefits of mindfulness, but also want the proof points... just like us.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep
    
Whil Concepts, Inc.
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Epson     Published Date: Jun 22, 2018
Businesses like yours rely on e ective internal and external connections between employees to operate e ciently. But you might be discovering that the old ways of conveying important business messages are no longer enough for your sta . Relying only on telephone calls, email, and face-to-face meetings alone could be now considered a competitive disadvantage. It also makes it more di cult to attract top talent, and inhibits the communication speed most enterprises now require.
Tags : 
    
Epson
Published By: Engagio     Published Date: Oct 10, 2019
Read the report today! Want to make sure you're investing in the right ABM technology? Research in Action released the Top 20 Global Vendors for ABM in 2019 using their proprietary Vendor Selection Matrix™, and Engagio was the #1 Global winner! Read the report to learn why Engagio placed #1 based on 1,500 customer interviews and Research in Action's independent analysis of each vendor. Read the report to discover: The top 20 global ABM providers and how they measure up How to select the right technology for your ABM needs 5 insights and predictions for ABM by Research in Action
Tags : 
    
Engagio
Published By: Rovi     Published Date: Apr 08, 2013
An Introduction to Rovi Insight Series Volume 1
Tags : 
rovi, over-the-top, ott, entertainment metadata, digital media, digital discovery, entertainment discovery, recommendations engine
    
Rovi
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process
    
Process Software
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free IDC analyst report, discover why coordinating the activities of marketing and sales—from day one of the revenue cycle—is essential for profitability. Learn how to stop the revenue loss that occurs during a prospect handoff; how to give sales the freedom to target more efficiently, while enabling marketing to build better prospect relationships; and how to choose software that tightens the marketing/sales alignment. Download your copy of this insightful report now.
Tags : 
marketing, sales, alignment, coordination, software, leads, sales leads, demand generation
    
Marketo, INC.
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
    
Webroot
Published By: Ultimate Software     Published Date: May 10, 2013
Too often, it's easy to overlook the minutiae of payroll processes, which can result in costly errors and time-consuming corrections. Even the smallest of payroll slip-ups can snowball into long-term issues and increased expenses, especially if those mistakes continually occur. Additionally, some blunders make organizations vulnerable to regulatory fines and penalties. The good news: most common mistakes are avoidable. Auditing, testing, reporting, and other "checks and balances" can confirm that your payroll is accurate the first time. But when mistakes happen, it's important to determine what occurred and why, and then identify the root causes so they don't happen again. Download this white paper to learn about the top 10 payroll pitfalls, along with practical ways to prevent them.
Tags : 
    
Ultimate Software
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this survey for an overview of the priorities and needs of the top search marketers around the globe. With over 500 search algorithm changes in the past year, this survey seeks to offer guidance on how leaders continue to stay ahead in the competitive search marketing industry.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance
    
Intralinks
Published By: Panorama     Published Date: Jan 22, 2014
To help organizations evaluate their Business Intelligence needs, Panorama Software has built a vendor agnostic multi-vendor evaluation work sheet. Organizations can rank as many vendors as they wish in a spread sheet that contains over 150 features. All data is then aggregated into a results sheet, displaying your top options.
Tags : 
panorama, business intelligence, bi vendors, free tools, bi matrix, intelligence, buyers guide, data management
    
Panorama
Published By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
    
VMware AirWatch
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey
    
CloudEndure
Published By: AON     Published Date: Aug 29, 2017
There are the obvious things that can affect your organization’s bottom line: sales performance, the economy, overhead. But here’s something you probably didn’t expect: the experience candidates have when they apply to work for your firm—that has an effect too. On Thursday, April 6th at 10AM CT, experts from Aon’s Candidate Selection and Assessment group will discuss how the creation of an incredible candidate experience can be used to foster an energizing candidate experience and how that affects desired business outcomes. Topics of discussion will include: ? The current state of the candidate experience ? How the candidate experience affects an organization’s brand and bottom line ? What candidates are looking for in the assessment process ? What a great candidate experience looks like
Tags : 
    
AON
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA
Published By: SAS     Published Date: Mar 06, 2018
“If we had done anything differently in Washington state, we would have done it faster,” said Hammersburg. “The key message is that fraud prevention – dealing with risk and program integrity – is not a cost issue, it’s a saving. When you can truly quantify the positive impact to the bottom line of a company or government agency, you shift the recognition that this is not an expense but that it’s a saving.” Some government organizations may be concerned that a rigorous program to shine a light on the underground economy will shine a brighter light on how much they didn’t know until now. Don’t let that stop you, said Hammersburg. “You have the opportunity to really get ahead of it now. Turn a risk into an opportunity going forward.”
Tags : 
    
SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.