Skip to main content
 

word

Results 551 - 575 of 586Sort Results By: Published Date | Title | Company Name
Published By: WOLF Frameworks     Published Date: Jan 31, 2011
Platform-as-a-Service (PaaS) is an increasingly popular paradigm moving from being a buzzword to the mainstream.
Tags : 
platform-as-a-service, paas, saas, cloud computing, paas types, paas advantages, paas monetization, paas pricing, paas service levels, application development, web applications, software-as-a-service
    
WOLF Frameworks
Published By: Janrain     Published Date: Feb 28, 2011
Proven social media strategies to make your business website more relevant, amplify the quantity and quality of word-of-mouth marketing, build trust and loyalty, enhance stickiness and multiply conversions.
Tags : 
janrain, social media, social login, carri bugbee, social media integration, social strategy, social sharing, share button, social sign-in, social sign-on, facebook connect, rss, feeds, ratings, reviews, gaming, gamification
    
Janrain
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
    
Confident Technologies
Published By: SPYRUS     Published Date: May 12, 2011
Why PKI authentication is more secure
Tags : 
securid, pki, authentication
    
SPYRUS
Published By: Hitachi ID     Published Date: Jun 09, 2011
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
Tags : 
password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords
    
Hitachi ID
Published By: TriNet     Published Date: Jan 22, 2013
The word “venture” in the phrase “venture capital” is a romantic euphemism for risk. But that’s not to say that every new startup business is a “gamble.”
Tags : 
trinet, 6 vcs weigh in, ipo
    
TriNet
Published By: Crowdtap     Published Date: Jul 03, 2012
New from Crowdtap, learn why influence is the hottest topic in marketing and social media. We'll show you how to tap your brand's peer influencers to drive advocacy and boost word-of-mouth online and off with 5 Keys to Success in Influencer Marketing.
Tags : 
influence, influencer, influence marketing, influencer marketing, influence score, social marketing, social roi, social media, word-of-mouth, wom, word-of-mouth marketing, wom marketing, advocacy, brand advocates, brand advocacy, digital marketing, buzz marketing, product sampling, marketing research, marketing insights
    
Crowdtap
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Published By: Oracle     Published Date: Feb 14, 2013
This paper explores how current business and talent management processes and technology must evolve in order to effectively deliver business value in the next 5 to 10 years. Research in this paper is supported by words from thought leaders and more.
Tags : 
future of talent management, management, underlying drivers, change, thought leaders of talent management
    
Oracle
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
    
Imprivata
Published By: Salesforce     Published Date: Dec 02, 2015
When Salesforce CEO Marc Benioff co-founded the cloud computing company back in 1999, one of the first things he did was define his management process. As he shares in his book Beyond the Cloud, Benioff wanted to put into words what his focus was and then clearly communicate it to the rest of the business. The result was the V2MOM (pronounced “V2 mom”), an acronym that stands for vision, values, methods, obstacles, and measures. Benioff says this system has helped keep everyone at the fast-growing company on the same page over the years. Below are the basic steps of Benioff’s V2MOM system. You can use them to start defining your management process.
Tags : 
    
Salesforce
Published By: MobileIron     Published Date: Jul 01, 2019
New IDG Research Finds That IT Leaders View Mobile
Tags : 
    
MobileIron
Published By: VMware AirWatch     Published Date: Nov 13, 2015
In den vergangenen Jahren ist der Begriff „BYOD“ am Arbeitsplatz immer populärer geworden, weil zahlreiche Unternehmen auf mobile Geräte umgestiegen sind. BYOD ist aber nicht nur ein begrifflicher Trend oder einfach nur eine Abkürzung. Es handelt sich um einen viel größeren und stärker verwurzelten Trend: die stärkere Orientierung der IT an Verbraucherprodukten, die seit Anfang des 21. Jahrhunderts zu beobachten ist. Damals verfügten nahezu alle über einen PC, mit dem sie nach Feierabend zu Hause arbeiten und dabei die Vorteile nutzen konnten, die ihnen das eigene, vertraute und sorgfältig ausgewählte Gerät gegenüber dem von der Unternehmens-IT bereitgestellten System bot.
Tags : 
byod, vmware, productivity, it management, mobile accessibility
    
VMware AirWatch
Published By: Maxaudience     Published Date: Oct 12, 2015
Over the last 12 years, a massive amount of material has been written about Search Engine Optimization (SEO). The majority of the information is acceptable, but there’s a lot of dated information still being promoted as best practices (exact match domain names, keyword density targets, exact anchor text, and so on). In this eBook, you’ll learn the current best practices in SEO that companies of all sizes can use to increase site visibility and the number of visitors coming to your site, and most importantly, improve conversion rates.
Tags : 
seo, domain names, keyword density targets, exact anchor text, site visibility, number of visitors, conversion rates
    
Maxaudience
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: Workterra     Published Date: Mar 21, 2016
At more than 14 million words long, the Affordable Care Act (ACA) is a daunting piece of writing to tackle. Most of the act’s intricacies and complexities require a solid knowledge of several different lines of business, as ACA compliance touches finance, tax, legal, IT, benefits, and HR.
Tags : 
workterra, aca, affordable care act, reporting, healthcare
    
Workterra
Published By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
cloud initiative, personal security, personal device, password protection, security, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Juniper Networks     Published Date: Jun 29, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today. Several of the most visible tactics to kick-start innovation in FSI organisations include launching innovation or incubation centres, launching hackathons, partnering with or acquiring start-ups, venture investment or simply trying to develop solutions in house. Whilst each of these approaches has potential, there is a risk that organisations fall into the trap of innovation theatre, in other words, failing to effectively integrate cutting edge technology into key business functions.
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Juniper Networks
Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that don’t comply with standards and regulations. And today’s email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle
Published By: Kronos     Published Date: Sep 20, 2018
Every retailer and retail technology vendor wants to be innovative. But the word innovation is used so often in the modern retail landscape that it has almost lost all meaning. When you actually stop to think about what innovation truly means to retail, however, it is obvious that it is not meaningless; in fact it is the lifeblood of the industry.
Tags : 
    
Kronos
Published By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.