Skip to main content
 

safe

Results 326 - 350 of 969Sort Results By: Published Date | Title | Company Name
Published By: Kronos     Published Date: Sep 24, 2018
While there are many factors that contribute to workforce engagement, you can start by focusing on top employee needs that contribute to a positive work environment including Safety, Flexibility, Fair treatment and the opportunity to make an impact.
Tags : 
    
Kronos
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Cyber-crime is forecast to cost the global economy $6 trillion by 2021, up from $3 trillion in 2016. Described by some as the “greatest threat to every company in the world”, public concern for the safety of data is growing – not just in how criminals might use stolen data to commit fraud, but also in how personal data is used by the organizations we engage with.
Tags : 
data, cyber crime, company, personal, management, gdpr
    
AstuteIT_ABM_EMEA
Published By: Schneider Electric     Published Date: Mar 06, 2018
"This paper contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs."
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Schneider Electric     Published Date: Sep 17, 2018
This on demand webinar contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Google Chrome Enterprise     Published Date: May 11, 2018
IT can add a critical layer of security with the web browser. Chrome Browser is setting the standard for web safety and stability in the enterprise. Watch this animation to hear about how Chrome is protecting your users' browser experience as they do more work in the cloud.
Tags : 
    
Google Chrome Enterprise
Published By: K 12 Insight     Published Date: Apr 13, 2018
After Parkland, Safety is on everyone’s mind. While physical safety measures, such as metal detectors and door locks can help, school leaders also have to think about emotional safety. Do students feel safe in your schools? Download this guide, and learn three ways to give students and parents a voice in the school safety discussion.
Tags : 
school safety, k-12, bullying, school leaders, safety policy, threats, communication
    
K 12 Insight
Published By: K 12 Insight     Published Date: Apr 13, 2018
It’s no secret: school climate is the single-biggest indicator of school performance. Translation: When students feel safe and engaged in school, they perform better. But how do you measure climate? Download our latest resource and learn the five elements every school climate initiative needs to succeed.
Tags : 
k-12, school climate, school quality, parent engagement, community engagement, staff engagement, student engagement, essa
    
K 12 Insight
Published By: Zerto     Published Date: Oct 08, 2018
"With so many organizations looking to find ways to embrace the public cloud without compromising the security of their data and applications, a hybrid cloud strategy is rapidly becoming the preferred method of efficiently delivering IT services. This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy. Topics discussed include: Why Cloud? Getting There Safely IT Resilience in the Hybrid Cloud The Power of Microsoft Azure and Zerto You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business. Download the guide today to begin your journey to the cloud!"
Tags : 
hybrid, it resilience, cloud strategy
    
Zerto
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Most of the public and its public safety professionals live and work in a digital world of mobile devices instant connectivity, and geo-location. This one powerful fact, is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices. Download this whitepaper today to find out how Fujitsu can help your organisation today. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
business solutions, integrated management, public sector
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Most of the public and its public safety professionals live and work in a digital world of mobile devices, instant connectivity, and geo-location. This one powerful fact is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices.1 With the help of advanced technologies, citizens and trusted partners, agencies are: Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: insightsoftware     Published Date: Oct 19, 2018
Over the past few decades, technology has advanced by leaps and bounds, altering how we live and work. As machines take over certain jobs for safety or improved accuracy, some are concerned that technology will eventually replace people. But as businesses incorporate machines and technology deeper into workplaces, it is evident that a mindset shift needs to occur. The working world must find ways to incorporate technology so that people do what people do best, while allowing computers to do what computers do best. It’s time to think differently about technology. It’s time to make technology part of the team. To download this white paper, please complete the following form.
Tags : 
    
insightsoftware
Published By: Magnetrol     Published Date: Nov 05, 2018
Tank overfill is a crucial safety concern in the petroleum industry. Failure to put adequate prevention measures in place has resulted in injuries, loss of life, and billions of dollars worth of damages worldwide. These resources were developed by the level control experts at Magnetrol to help you implement and maintain an effective Overfill Protection Plan for your terminals. Simply click on the downloads below at the Resources section to access this important information.
Tags : 
    
Magnetrol
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Creating a sound enterprise security strategy is a monumental task. Knowing where to invest, how to best support users and keep corporate resources safe and secure is a balancing act that requires the deftest of hands. By implementing an identity governance program and creating a user-centric security strategy, your organization can empower users, gain full visibility and complete control of data access to move forward, securely and confidently.
Tags : 
    
SailPoint Technologies
Published By: Mimecast     Published Date: May 15, 2014
Best practices for the safe and secure use of file sharing services for organisations.
Tags : 
file sharing security, file sharing services, best practices, storage services
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : 
email security, email fraud, whaling, mimecast, loss prevention
    
Mimecast
Published By: VMware AirWatch     Published Date: Nov 12, 2015
IT requires a solution that solves the challenge of securing proprietary applications and data in the cloud datacenter and is available only to users and devices that are delegated safe for access. VMware NSX solves this challenge through user-level micro-segmentation. The VMware NSX approach offers several differentiated advantages over traditional security approaches.
Tags : 
vmware, cloud datacenter security, mobility, smart networking, vmware nsx, micro segmentation
    
VMware AirWatch
Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global
Published By: Grey Matter     Published Date: Jan 13, 2017
This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.
Tags : 
cloud, cloud computing, data, security, data security, data safe, cyber attacks
    
Grey Matter
Published By: Grey Matter     Published Date: Jan 31, 2017
This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.
Tags : 
cloud, cloud computing, data, security, data security, data safe, cyber attacks
    
Grey Matter
Published By: Workday UK     Published Date: Mar 08, 2018
It’s no small feat for CIOs to balance efforts to support agility, contain IT costs, and keep data safe and secure. Moving to the cloud delivers on those first two priorities, but what about security? Can the cloud really keep your information safe? In the CIO.com report “Demystifying Cloud Security,” you’ll learn why the cloud is your best bet for data security and discover additional benefits your business could experience by moving to the cloud. Read the report to learn more.
Tags : 
    
Workday UK
Published By: Eloqua     Published Date: Jan 13, 2012
Email deliverability is about maximizing the potential number of emails reaching the inbox. Privacy is about safeguarding the personal information contained in your mailing database. Download this guide to learn about privacy and deliverability.
Tags : 
email deliverability, email privacy, privacy and deliverability, email marketing, marketing automation, email marketing platform, digital body language, database marketing, email privacy policy
    
Eloqua
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.