company

Results 1 - 25 of 2541Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Schneider Electric     Published Date: Jul 01, 2019
The first-ever Global Digital Transformation Benefits Report is here. The report analyzes 230 customer stories and 330 data points to provide concrete evidence on digitization's disruptive potential. It examines how digital transformation has driven CapEx and OpEx savings, sustainability initiatives, equipment uptime, and other key business goals. It also includes stories from 34 of our customers, including how: • Tata Power, an Indian power company, cut power restoration times from hours to seconds. • New Belgium Brewing, a US beer company, cut downtime by 50%. • Vitens, a Dutch water utility, shrank deployment times by 65%.
Tags : 
digital, iiot, water, food and beverage
    
Schneider Electric
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
Basic diagramming tools allow business users to define an initial business process and provide a good path to getting your processes off of sticky notes and into a digital format. However, if company-wide collaboration, real-time change management and integration with automation tools are important to you, a dedicated process modeling tool may be your better choice.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Organizations in the global industrial products industry face significant challenges: cost pressures, increased regulations, disruptive technologies and the increasingly costly delivery of raw resources. High volatility in commodity prices has put severe pressure on company margins and can quickly expose inefficient operations.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Digital technology is redefining possibilities in Energy, Environment and Utilities. Disruptive forces, emerging consequences, pressing challenges, and provocative opportunities. Learn how industries benefited from your data. Learn how IBM E&U describes disruptions manifested in Energy, Environment and Utilities. IBM identifies three ways your company focus can to stay ahead of the competition in pressing challenges. Additionally, identifying three provocative opportunity actions that are needed to get going.
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
According to Gallup, 1/3 of employees could be lured away by the possibility of work flexibility. And the best way to securely deliver that flexibility is to move beyond virtualizing desktops and into the secure digital workspace. Read the white paper to see why making the move — with the help of a trusted partner —can help you: • Improve user productivity • Empower your IT organization to be more agile • Better protect your company data
Tags : 
    
Citrix ShareFile
Published By: Genesys     Published Date: Dec 20, 2018
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements
Tags : 
    
Genesys
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : 
application modernization, forrester consulting, apo, asg, application portfolio optimization, application integration, application performance management, business activity monitoring, business intelligence, business management, business process automation
    
ASG Software Solutions
Published By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : 
extensis, direct wine, portfolio server, images, dam, solutions, application integration
    
Extensis
Published By: Decca Consulting LLC     Published Date: Sep 14, 2012
Most Companies Have an Issue with Talent Acquisition and Retention. This can be overcome by working with the right Staffing Company who will understand your need and work at a reasonable cost tailored to fit your budget.
Tags : 
    
Decca Consulting LLC
Published By: UMEED SOFTWARE SOLUTIONS PVT LTD     Published Date: Feb 18, 2013
OUR ORGANIZATION IS A PRIVATE LIMITED COMPANY AND EXTREMELY SOUND IN SOLAR PV APPOINTMENT SETTING/SURVEY,EVERY INFORMATION GETS CAPTURED VERY CAREFULLY SO THAT THOSE ARE QUALIFY-PRO AND REAL TIME CONVERTIBLE.
Tags : 
    
UMEED SOFTWARE SOLUTIONS PVT LTD
Published By: Site Pro PPC     Published Date: May 14, 2009
Often times hiring a professional to manage your PPC accounts actually saves you money. Check out our free whitepaper to find out why!
Tags : 
site pro, ppc, ppc management, adwords, google, yahoo, msn
    
Site Pro PPC
Published By: Mcorp Consulting     Published Date: Feb 17, 2010
See how the landscape of customer experience is being altered forever, as touchpoints continue to drive shifts in distribution, feedback and marketing channel control. In this whitepaper, you'll learn how making your touchpoints stronger, faster and smarter today will mean increased profits and stronger market positions tomorrow. (Plus 7 specific steps any company can take to improve customer experience today.)
Tags : 
mcorp, customer experience, relationship lifecycle, loyalty, retention, bottom line, touchpoint marketing, touchpoint mapping, touchpoint management, touchpoint agency, customer experience strategy, customer journey mapping, touchpoint management, customer experience measurement, customer mapping, customer satisfaction measurement, crm
    
Mcorp Consulting
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, database development
    
Zynapse
Published By: Magic Logix     Published Date: Oct 20, 2012
According to Buzz Marketing, 85% of business buyers believe companies shouldn't just present information - they should engage with prospective buyers.
Tags : 
    
Magic Logix
Published By: Swagatham Info Media Private Limited     Published Date: Mar 12, 2013
Swagatham Info Media Private Limited offers top-quality professional web design and web programming services.
Tags : 
    
Swagatham Info Media Private Limited
Published By: Wheelhouse Enterprises     Published Date: Jul 14, 2010
This comprehensive PBX Buyers Guide explores the PBX technology (both hosted and traditional) and empowers the mid to enterprise business PBX buyers with critical information necessary that is helpful in selecting the right phone system for any business.
Tags : 
wheelhouse, pbx, ip telephony, hosted, traditional, enterprise, phone system, voip
    
Wheelhouse Enterprises
Published By: Cotendo     Published Date: Sep 01, 2010
The company wanted a high-performing CDN partner that understood and supported AdBrite's vision and provided the same transparency in its services.
Tags : 
cotendo, case study, adbrite, high-speed ad delivery, cdn, content delivery, content integration, content management system, document management, information management
    
Cotendo
Published By: Cotendo     Published Date: Sep 01, 2010
The company needed a different CDN and website acceleration solution to provide its users with the level of responsiveness to changing stock market conditions that they depend on - and that Seeking Alpha demanded of itself.
Tags : 
cotendo, case study, real-time financial market information, cdn, content delivery, collaboration, collaborative commerce, content integration, content management system, document management, information management, secure content management
    
Cotendo
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.