Skip to main content
 

corporate

Results 1 - 25 of 1067Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Creating a sound enterprise security strategy is a monumental task. Knowing where to invest, how to best support users and keep corporate resources safe and secure is a balancing act that requires the deftest of hands. By implementing an identity governance program and creating a user-centric security strategy, your organization can empower users, gain full visibility and complete control of data access to move forward, securely and confidently.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
The ever-increasing wave of data breaches is affecting how organizations are looking at security. No longer is it enough to simply build a perimeter around the corporate network; malicious actors are increasing choosing alternative – and far easier – methods of entry: your users. For your organization to be secure, your security strategy must evolve from network-centric to user-centric. This white paper details the increasingly complex relations between your users and your corporate resources, which is redefining how perimeter defenses and how organizations must think about identity governance.
Tags : 
    
SailPoint Technologies
Published By: RSM US     Published Date: Feb 08, 2019
For decades, corporate social responsibility (CSR) plans have been used by companies in varying degrees to participate in select charities and causes; however, in recent years, CSR strategies have evolved as an important way for businesses to connect with their communities, demonstrate commitment to core values and deliver on brand promises.
Tags : 
    
RSM US
Published By: Location3     Published Date: Feb 07, 2019
In our experience as franchise marketers, Local Ad Fund dollars provide a solid foundation for paid search campaigns that drive consistent, high quality-low cost, leads. However many franchisees and local business owners could be doing more to support established corporate search marketing campaigns, ultimately capturing the maximum search interest for their services within their markets, driving increased local revenue.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local store revenue, franchise paid search
    
Location3
Published By: Workday     Published Date: Feb 04, 2019
The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: Feb 01, 2019
"The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday Nordics     Published Date: Feb 01, 2019
The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Nordics
Published By: Lola Travel Company     Published Date: Jan 24, 2019
A well-thought-out, easy-to-create and easy-to-enforce business travel policy will contribute to transparency, a cultural mecca in any organization. By fostering fairness, a mutually beneficial corporate travel policy provides company travelers with the freedom they desire, without sacrificing company governance and control. As an HR or Finance leader, you've answered countless repetitive questions about per diems, business class vs. economy class, and hotel restrictions. A formalized travel policy is not as hard to create as it may seem, and it will eliminate the stress for both you and your travelers. In this ebook, you will learn the 10 easy steps to take in order to create a win-win corporate travel policy that works for you and your team.
Tags : 
    
Lola Travel Company
Published By: Lola Travel Company     Published Date: Jan 24, 2019
Think you can survive without a corporate travel policy, and continue having employees book trips on their own without harming your company? Think again. Check out this must-read e-book, "Do You Need a Corporate Travel Policy?" from Lola.com and learn: The 5 must-haves in a corporate travel policy Shocking stats about business travel impact on employee job satisfaction How to save time/money, lose stress with an employee-friendly travel policy Decide for yourself if a “wild west” business travel approach with “rogue employees” is smart for your business (hint: it’s not!). DOWNLOAD THE E-BOOK NOW!
Tags : 
    
Lola Travel Company
Published By: Lola Travel Company     Published Date: Jan 24, 2019
If you've ever felt overwhelmed trying to sort through all the corporate travel per diem guidelines out there, you are not alone. That's why we created this ebook, "Lola.com's ultimate guide to corporate travel per diems." You'll learn things like: -How to separate meal per diems from hotel per diems and other incidentals. -How to set smart guidelines for your employees that save your company money and give travelers a productive trip. -How to make sure you are spending money on the important things when it comes to daily travel expenses.
Tags : 
    
Lola Travel Company
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Equinix APAC     Published Date: Jan 11, 2019
"New applications of digital technology have been sweeping economies, industries, and markets across the globe. The accompanying multitude of novel opportunities and challenges for companies are the stuff of daily business headlines. To better understand what these digital transformations mean for enterprises in Asia, Equinix sponsored an executive forum organized by The Economist Corporate Network, “Digital Asia: Asia’s digitally transforming economies”. This paper summarizes the insightful discussions around digital transformation at the event and analyzes what that means for enterprises in Asia-Pacific. Highlights How is digitization tangibly changing economies in Asia? In what ways are the latest trends impacting business?
Tags : 
    
Equinix APAC
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Workday     Published Date: Dec 20, 2018
The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology.
Tags : 
    
Workday
Published By: Workday APAC     Published Date: Dec 18, 2018
"The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology."
Tags : 
    
Workday APAC
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Coupa     Published Date: Dec 14, 2018
Organizations need a new way to manage this complexity and uncertainty in an environment where expectations for results are rising, not falling. Download this asset to learn how Business Spend Management (BSM) empowers both centralized and decentralized corporate functions with: - Fully scalable processes that increase user adoption and ease of use - Capital efficiency to maximize savings and process efficiency - Business agility to adapt to changing conditions such as acquisitions, growth, etc. - And much more! Download this complimentary report to learn all the ways BSM powers your business success!
Tags : 
    
Coupa
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Gigamon     Published Date: Dec 13, 2018
"Security Delivery Platforms for Dummies" shows IT professionals how to transform the network deployment of security and monitoring tools for better efficiency and effectiveness. Learn how to detect threats faster by removing network blind spots, monitor what's happening across the global enterprise and optimize your security tools’ performance and efficacy. If you are responsible for protecting corporate networks or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.