Skip to main content
 

word

Results 126 - 150 of 577Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications
    
Okta
Published By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
OKTA
Published By: Okta     Published Date: May 12, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
Okta
Published By: ClickExpress     Published Date: May 01, 2013
Deploying a mobile workforce solution used to be a major undertaking. Today, it’s easy. You don’t need any specialized devices; management software is cloud-based, and training is short and simple. In other words, obstacles of the past have disappeared, and now is the time to implement mobile workforce solutions for organizations with between 15 and 250 mobile workforce. In this brief, you’ll see why it’s easier than ever to implement software solutions for mobile workforce.
Tags : 
mobile, workforce, solution, organizations, mobile, implement, software
    
ClickExpress
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
sales
    
Seamless
Published By: Jobvite     Published Date: Oct 21, 2013
While consolidation can sometimes be a good thing, recruiters should look closely before buying into big corporate HR bundles. Recruiting tasks can be extremely specific in nature. Not all companies are alike. Job requisitions are often widely varied. So how do you know which side to take in the great debate? Here are some words of wisdom to keep in mind when considering your options.
Tags : 
    
Jobvite
Published By: Engine Ready     Published Date: Jun 05, 2007
In its quest to continue increasing market share, American Financial Services (AFS) began to realize the importance of a solid analytics package to help develop and track a list of targeted keywords in several pay-per-click search engines. Additionally the highly competitive nature of their most popular keywords was creating a considerable marketing challenge.
Tags : 
pay per click, search engine marketing, web analytics, online marketing, web marketing, internet marketing, ppc, sem
    
Engine Ready
Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: Workday Netherlands     Published Date: Feb 04, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie – en hoe u een digitale impasse voorkomt.
Tags : 
workforce-technologie, digitale strategie
    
Workday Netherlands
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950
    
Cenzic
Published By: Dell Software     Published Date: May 10, 2013
The fact is that managing Window service accounts is time-intensive and tedious, so managing them well is nearly impossible—without the right third-party tools. Read this white paper to discover how easy it can be to manage services in Windows.
Tags : 
dell software, service account, automated tools, secure passwords
    
Dell Software
Published By: K2     Published Date: Jun 10, 2015
Business process management (BPM) needs can vary widely, from top-down business transformation initiatives to smart process applications to enterprise resource planning, marketing, social and more. With this breadth and depth of reach, BPM – and BPA, business process automation – are more than a couple of buzzwords, they are absolutely mission critical.
Tags : 
    
K2
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
    
Cisco
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
citrix, quickbooks, file sharing, file security, pdf protection, customer service
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
client engagement, data security, confidential data, data protection, email security, customer service
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection, accounting protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
Okta
Published By: Bazaarvoice     Published Date: Jan 26, 2011
In our second annual marketing survey, we surveyed CMOs in The CMO Club about their use,expectations, and measurement of social media, then compared the results to the previous year's survey. In short, 2009 marked the year CMOs embraced social media marketing but struggled to tie their strategies to the bottom line. Many evaluated engagement metrics created from social media- such as the number of click-throughs to the website or number of fans or followers - instead of evaluating business metrics like revenues and conversion. In 2009, CMOs aspired to tie social to the bottom line.
Tags : 
bazaarvoice, social marketing, ctr, engagement, crm, customer service, word-of-mouth, ugc
    
Bazaarvoice
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers can’t solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitor’s behalf. Sensitive fields like social security numbers and passwords can be blocked from the agent’s view so private information remains just that, private. Bold360’s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account – providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks
    
Lumension
Published By: Airfoil PR     Published Date: Apr 21, 2010
In our latest Point of View, "The Dirtiest Word In Business," Airfoil has assembled a collective set of best practices to help technology marketers meet the communications challenges of a new digital decade.
Tags : 
airfoil, innovation, pov, public relations, integration, communications
    
Airfoil PR
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.