Skip to main content
 

word

Results 176 - 200 of 561Sort Results By: Published Date | Title | Company Name
Published By: Verizon     Published Date: Nov 14, 2013
Learn the seven most common flaws with password use by individuals and companies and how Multifactor Authentication will make your systems more secure while cutting costs and avoiding inconveniences.
Tags : 
verizon, infrastructure security, multifactor authentication
    
Verizon
Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
    
Imprivata
Published By: MarkLogic     Published Date: Mar 29, 2018
Real World Evidence (RWE) requires the correlation of complex, frequently changing, unstructured data. To the enterprise architect, that means extracting value from data that doesn't neatly fit solutions. In this white paper, we dive into the details of why relational databases are ill-suited to handle the massive volumes of disparate, varied, and changing data that is required to be successful with RWE. It is for this reason that leading life science organizations are going beyond relational to embrace new kinds of databases. And when they do, the results can be dramatic.
Tags : 
data, integration, volume, optimization, architect, enterprise
    
MarkLogic
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: MobileIron     Published Date: Feb 12, 2019
The adoption of mobile and cloud technologies is driving massive change in organizations around the world. These new technologies enable organizations to streamline business processes, lower costs, and help employees work productively anywhere. However, securing mobile apps and cloud services requires more than passwords and legacy security approaches that aren’t designed for the mobile-cloud world.
Tags : 
    
MobileIron
Published By: Okta     Published Date: Feb 22, 2017
This white paper offers an overview of Okta’s solutions. Read it now and take one step closer to true enterprise security.
Tags : 
    
Okta
Published By: Progress     Published Date: Jan 22, 2019
One of the biggest buzzwords for marketers over the past several years is personalization. When discussing this concept, people often use the terms “personalization” and “customization”interchangeably. Not clearly understanding the differences may explain why some businesseshave difficulty implementing better experiences for their customers.
Tags : 
    
Progress
Published By: AdHawk     Published Date: Nov 06, 2017
Download this easy-to-read glossary to understand any and all Google AdWords definitions!
Tags : 
google, adwords, adhawk
    
AdHawk
Published By: AdHawk     Published Date: Nov 06, 2017
In this guide, Adhawk uses their extensive knowledge of the AdWords platform to first get you started with your first campaign and then walk you through the various tips and tricks you will need to be successful.
Tags : 
google, adwords, adhawk, adwords platform
    
AdHawk
Published By: AdHawk     Published Date: Nov 06, 2017
Download this guide to understand AdWords Ad Extensions more thoroughly!
Tags : 
google, adwords, adhawk, ad extensions
    
AdHawk
Published By: Magento     Published Date: Mar 28, 2018
International retail sales are expected to increase by 5.5% to $28.3 trillion by 2018. launching an international site can take up valuable time and resources, and missteps can be costly. From web page layout, to word definitions and cultural preferences, countries have widely varying practices and unique online user behaviors. How efficiently you manage changes in culture, language, customs, currency, tax, and laws can make the difference between success and failure. POWER YOUR BUSINESS TO EXPAND RAPIDLY INTO FOREIGN MARKETS: Think Local and Flexible to Act Global Communicate in Other Cultures Design a Flexible and Scalable Global Process Efficiently Manage Multiple International Sites
Tags : 
international, markets, company, globally, competition
    
Magento
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers can’t solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitor’s behalf. Sensitive fields like social security numbers and passwords can be blocked from the agent’s view so private information remains just that, private. Bold360’s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account – providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: Oracle     Published Date: Jun 05, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay discuss the role of Marketing in business innovation. Discover what it means to innovate, some examples of successful innovation, and what they are actually doing to scale that growth. It’s time to find out how Marketing is shaping business culture through innovative technology. Watch the talk now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 05, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay get to the bottom of the role of Marketing in innovation, how to set your growth KPIs, and how to overcome the internal barriers innovators can face. Find out how Marketing is stepping into the lead through new technology, innovation and growth. Watch the talk now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
Among all the trends and buzzwords currently shaking up the marketing industry, one concept is emerging as the one to watch: customer experience (CX). Providing individual customers with the best possible experience is becoming the top priority at the moment, even to the point where experience outshines product quality(!) as the main differentiator. This is confirmed by a recent Gartner1 survey, in which 86 percent of participating companies listed customer experience as the main factor for gaining a competitive advantage, compared with merely 36 percent in 2012.
Tags : 
customer lifecycle, lifecycle marketing, customer experience, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning, product recommendation
    
Selligent Marketing Cloud
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: MobileIron     Published Date: Jul 01, 2019
New IDG Research Finds That IT Leaders View Mobile
Tags : 
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.