Skip to main content
 

eft

Results 1 - 25 of 414Sort Results By: Published Date | Title | Company Name
Published By: TrendKite     Published Date: Apr 25, 2018
Sometimes a perfect storm comes together to signal a radical shift or rebirth of an industry. But it’s not enough to say public relations is in flux or rapidly changing. It’s more impactful to discuss the evolution of the change, understand the potential gaps, and be early to capitalize on opportunities created by these gaps. The path for change in the PR industry has been tumultuous. And understandably so. The irrationality of basing performance on vanity metrics is so ingrained in the profession that the left-brain, rational piece has been pushed aside. This has created a culture of estimating based on vanity metrics like AVE (ad value equivalency), leading to a dynamic where the C-suite craves that WSJ or TechCrunch story, yet doesn’t believe PR’s reporting on the value of that coverage. When everyone in the marketing stack is crunching numbers and showing real, tangible value, PR is holding onto air. Why keep setting the profession up for failure by perpetuating the cycle of abstr
Tags : 
ave, trendkite, marketing
    
TrendKite
Published By: Workday Netherlands     Published Date: Mar 28, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie – en hoe u een digitale impasse voorkomt.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology
    
IDology
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Business protection should never be taken lightly, but it can be tough to know where to begin. This checklist is a way to get you started, helping you safeguard your company.
Tags : 
business protection, intrusion, vandalism, theft
    
Tyco Integrated Security
Published By: Navex Global     Published Date: Dec 19, 2017
In 2017, business, societal and political events transpired at a pace that left many with a fractured view of the ethics & compliance industry and its expectations. Download the top 10 predictions that could influence your organization's ethics and compliance program in 2018, and our recommendations for what you can do right now. What you'll learn: The top trends and events that will impact your ethics and compliance program in 2018 How increased awareness and reporting of sexual harassment will affect your program The evolving role of the ethics & compliance officer How to create a culture of compliance
Tags : 
    
Navex Global
Published By: CradlePoint     Published Date: May 17, 2016
The “consumerization” of healthcare and sweeping policy changes will require that healthcare providers become more competitive or risk being left behind. Gaining the competitive edge means finding scalable efficiencies, leveraging the wealth of available patient data for improved care, and figuring out how to meet (or sometimes treat) patients where they already are—whether that happens to be at work, at the mall, or on the street. While Machine to Machine (M2M) and Internet of Healthcare Things (IoHT) technologies promise to create massive efficiencies and a transformed patient experience, traditional wired connectivity solutions are often costly, difficult to deploy, and don’t offer the flexibility required for effective M2M and IoHT deployments.
Tags : 
    
CradlePoint
Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Genesys     Published Date: Feb 08, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
More and more people are using their personal devices to work from home, but are they secure enough? With the proper preparation, your laptop or smartphone can actually help improve security. Read our white paper for 5 easy tips to work securely on your personal device: Where to store your files to avoid data theft or loss Why those pesky update notifications are too important to ignore How often you should change your passwords, really
Tags : 
data security, personal device, security tips, passwords
    
Citrix ShareFile
Published By: Salesforce Pardot     Published Date: Sep 09, 2014
It’s a common misconception that marketing automation is only for marketers, and that sales will be left with yet another system to learn how to use. This couldn't be further from the truth — in fact, it only takes a few hours for sales reps to learn everything they need to know to get the most out of an automation system.
Tags : 
marketing automation, sales teams, lead qualification, lead nurturing, tracking, cold calls, crm & customer care, sales
    
Salesforce Pardot
Published By: Cherwell Software     Published Date: Jun 21, 2018
Some would have you believe that ITIL® is on its way out. That it’s no longer relevant in today’s fast-paced digital environment. But ITIL still holds many timeless truths. As a set of best practice recommendations, ITIL provides a solid foundation and a common language for IT service management (ITSM) in these rapidly changing times. The problems arise when ITIL is seen as dogma. If you apply it too literally—as rules to follow, instead of recommendations to consider—ITIL will slow you down. You’re left struggling to keep up with ever-increasing user demands, not to mention your enterprise’s need to modernize and digitally transform. If you suspect ITIL is slowing you down, read on to uncover the seven ways ITIL has commonly been misapplied—and gain guidance on how you can go faster, while still upholding ITIL principles.
Tags : 
itil, implementation, digital
    
Cherwell Software
Published By: MuleSoft     Published Date: Jul 13, 2018
"Organizations are increasingly looking for ways to better compete in the market by releasing products and/or services more quickly. This has left us with a variety of technology buzzwords, from APIs and microservices to DevOps, all promising great gain. It’s worth asking: which are worth the cost and time to implement? And what are the advantages of APIs, microservices, and DevOps? Read this e-book to learn about the advantages of APIs, microservices, and DevOps, all of which can help organizations increase their capacity for change. Topics covered include: -The API economy and how it is igniting a cultural shift in businesses -How APIs and microservices are not only becoming the norm in enterprises, but are also changing the role of IT -Why DevOps and APIs deliver greater advantages and business value together, than they deliver individually"
Tags : 
    
MuleSoft
Published By: LifeLock     Published Date: Aug 23, 2016
This eBook focuses on the benefits of offering identity theft protection through the workplace, including reducing risk, streamlining remediation and choosing the right partner.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: Juniper Networks     Published Date: Oct 25, 2017
As IT becomes the cloud, and ever more central to business success, projects to transform the IT systems, and more specifically the data center, have become strategic and a competitive differentiator. A crucial piece of the data center transformation puzzle, and one which is too often left until the end, is the network. As the central nervous system of the data center, its transformation must be an integral part of the entire data center transformation project.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime, cyber crime, hacker, web security, internet security, internet security systems
    
Internet Security Systems
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Pure Storage     Published Date: Nov 02, 2017
To stay relevant in today’s competitive, digitally disruptive market, and to stay ahead of your competition, you have to do more than just store, extract, and analyze your data — you have to draw the true business value out of it. Fail to evolve, and your organization might be left behind as companies ramp up and speed up their competitive, decision-making environments. This means deploying cost-effective, energy-efficient solutions that allow you to quickly mine and analyze your data for valuable information, patterns, and trends, which in turn can enable you to make faster ad-hoc decisions, reduce risk, and drive innovation.
Tags : 
storage solutions, pure storage, oracle, analytics, business value, innovation, risk reduction
    
Pure Storage
Published By: ForgeRock     Published Date: Jul 09, 2015
In the great Internet of Things (IoT) gold rush, early adopters have largely left behind identity and access management. As a result, many organizations are scrambling to deal with the consequences. Successful IoT implementations have complex relationships to people, things, and services, and the only sustainable and secure method for securing the IoT long term is to enable persistent identity across applications, devices, and things.
Tags : 
idot, aim, lot, forgerock, applications, access management, architecture
    
ForgeRock
Published By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : 
ibm, unified governance strategy, data management, data governance
    
IBM
Published By: Adobe     Published Date: Mar 06, 2015
Connect the left and right brains of marketing to deliver the most compelling content to the right person at the right time. Read the Adobe Campaign Guide to Touchpoint Marketing to learn new marketing models that will help you reimagine personalization and get a holistic, 360-degree view of your customers.
Tags : 
marketing guide, adobe, marketing models, marketing trends, customer lifecycle
    
Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.