rsa

Results 151 - 175 of 627Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: Oct 03, 2013
Industry analysts EMS interview three users of Foglight from Dell to underscore the appeal of UEM, its essential value to IT, as well as Foglight versatility in supporting UEM’s multiple facets. Download How Foglight Makes User Experience Management a Reality: Three Case Studies today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion, knowledge management, enterprise applications, data management
    
Dell Software
Published By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware, anti virus, application security, authentication, encryption, high availability, internet security, intrusion detection, intrusion prevention, security management, pci compliance, vulnerability management
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
Read the Forrester Report: The Total Economic Impact of RSA Archer IT GRC and you'll be eligible to receive a free consultation from an RSA GRC expert who will calculate the projected ROI for your organization.
Tags : 
grc, rsa, archer, roi, compliance, risk, risk management, anti spam, anti spyware, anti virus, application security, authentication, business continuity, encryption, intrusion detection, intrusion prevention, security management, vulnerability management
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc, authentication, business continuity, encryption, identity management, internet security, intrusion detection, intrusion prevention, network security appliance, policy based management, security management, security policies, vulnerability management
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.
Tags : 
business continuity, disaster recovery, encryption, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, patch management, security management, vulnerability management
    
EMC
Published By: VersaSuite     Published Date: Aug 13, 2013
Healthcare providers do not have to live with functionality interruptions and budget strains created by an EHR that does not fit the facility. VersaSuite delivers a customizable EHR/HIS system to streamline the entire range of healthcare business processes.
Tags : 
ehr, electronic health records, ehr replacement, emr software, emr, electronic medical records, emar, ophthalmology, ent, cardiology, otolaryngology, cardiovascular, versasuite, practice management, pacs, hospital information system, his, budget, revenue cycle management, cpoe
    
VersaSuite
Published By: RSA Security     Published Date: Nov 06, 2013
See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Business Continuity Management Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC has received the highest rating of “Strong Positive” in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 18, 2013
This paper will explain how to achieve a balance between risk and business agility through a comprehensive approach to Operational Risk Management.
Tags : 
archer, rsa, operational risk, security, technology, business agility, comprehensive approach
    
RSA Security
Published By: BI WORLDWIDE     Published Date: Nov 18, 2015
As we head into a new year, here are the latest trends to ensure your employees get recognized at the right time - and with the right message - in an impactful way.
Tags : 
recruitment, retention, employee engagement, service anniversary experience, service award, service award investment, employee recognition, human resources
    
BI WORLDWIDE
Published By: Oracle CPQ BB     Published Date: Feb 05, 2016
How much selling power are you really getting from your sales teams? Are you making the most out of your CRM investment? Companies have a universal need for revenue growth, profitability, and customer satisfaction. In hopes to satiate this need, most companies have made significant investments in sales force automation to capture sales data, increase visibility to sales pipeline, and gain business insight to make better business decisions. However, few companies can say they have fully realized the benefits they hoped to achieve from their CRM investment. Additionally, with today’s modern, informed buyer, CRM technologies need to empower sales users with better information that’s easy to find and helps them sell. Read more to learn how Oracle Configure, Price, and Quote (CPQ) Cloud extends sales automation to simplify and streamline modern quote-to-cash processes and more!
Tags : 
    
Oracle CPQ BB
Published By: Brainshark     Published Date: Aug 02, 2017
As buyers have become increasingly more savvy and better-educated, B2B sales organizations have changed their strategies. But that can’t happen in a vacuum – sales training must change as well. This brief provides specific ways to improve both the training content delivered to sales reps and the all-important methods for delivering that content. With this actionable information, managers and trainers can begin enacting real change that gets reps more conversation-ready than ever before. Get your copy of this latest brief today. And ready your sales force for better opportunities and more wins.
Tags : 
sales mastery, b2b, b2b sales, salespeople, better selling, sales training
    
Brainshark
Published By: Brainshark     Published Date: Aug 02, 2017
Whether your sales reps are 25 or 65, sales enablement leaders all have the same goal: to ensure that reps are prepared to have impactful conversations with each and every buyer. However, the preferred methods of sales coaching change from generation to generation. Thankfully, sales coaching technology helps sales enablement leaders bridge that gap. This exclusive eBook provides details on how to use technology to alter your coaching strategy to appeal to next-gen sales reps, including: • Mobile and video-based coaching • Options for both formal and informal learning • Coaching for both individual and organizational mastery
Tags : 
next-gen sales force, sales enablement, coaching, salesforce
    
Brainshark
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : 
development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Sauce Labs     Published Date: May 30, 2018
In an age where your users demand no-fail experience, continuous testing has become a mission critical component for engineering teams of all sizes. However, while this topic was once discussed at lower levels, the conversation has made it all the way to the C-suite. No matter your industry, if your team isn’t thinking about testing at a high level, then there is a chance that you are missing out on revenue due to flawed app functionality, delayed releases and slowed innovation. It is important to understand the business benefits of continuous testing and automation to avoid these outcomes, and make the changes necessary to set your applications up for success.
Tags : 
    
Sauce Labs
Published By: Spredfast     Published Date: Nov 15, 2018
How Top Brands Automate Social Service Practices Today’s conversational commerce requires brands to provide immediate answers to their customers’ questions. Chatbots and artificial intelligence are fast becoming critical tools for customer service, bringing speed and scale that ensures a superior experience. But what are the best practices that marketers need to know to tackle the challenges of customer service automation? ?Learn from experts from General Motors, Booking.com and Spredfast about how to bring automation into your CX workflows and bolster your social service strategies. You’ll find out: How to think about automation for your business? How chatbots enhance your agent workflows?? ??How Booking.com and GM are using AI to drive inspiration and customer? service efficiencies??
Tags : 
    
Spredfast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.