rsa

Results 301 - 325 of 575Sort Results By: Published Date | Title | Company Name
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Zoovu Limited     Published Date: Apr 12, 2019
Customer Engagement is a huge area of interest today, and a subject that countless marketers are talking about. One thing above all is clear: the Engagement Economy provides incredible opportunity for brands. Those organizations that are willing to provide value and put the customer first will rise above the rest. To conclude, we highlight some of the key areas you should focus on: Create an effortless experience —understand customers, and use this knowledge to deliver the right level of personalized service every time. Make it easy to engage —offer a range of ways for customers to contact your organization to provide flexibility and meet the demands of a diverse customer base. Go the extra mile —creating memorable experiences can pay off and be rewarded by brand champions telling friends and family, engaging on social media and writing positive reviews.
Tags : 
customer engagement, digital engagement, guided selling, e-commerce, engagement economy, digital commerce, digital marketing, conversion, sales, growth, brands, customer experience, customer journey, conversion, engagement, machine learning, personalization, recommendation, conversational marketing, retail.
    
Zoovu Limited
Published By: Ensighten     Published Date: Jul 25, 2012
This video will teach you how tag management systems increase ROI from 3rd party tags, improve analytics and customer satisfaction.
Tags : 
web analytics, ensighten, marketing, tag management, tag marketing, internet marketing, insighten, universal tag, e-commerce, tag management roi, flash tagging, mobile tagging, universal tag, tag management systems, 3rd party tags, tms
    
Ensighten
Published By: Genesys     Published Date: Dec 20, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences Start small and deploy fast with MicroApps
Tags : 
    
Genesys
Published By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
security, technology, security tactics, data, application security, internet security, network security appliance, best practices, productivity
    
Cisco
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: MuleSoft     Published Date: Apr 15, 2019
In response to the federal government’s Cloud First initiative, agencies are moving to the cloud at an accelerated rate - moving on-premise applications, data and workloads to cloud infrastructure and adopting SaaS technologies like Salesforce, ServiceNow and Workday. What many in government have found is that integration and looking for government integration solutions has emerged as a stumbling block that has prevented government from realizing many of the benefits of moving to the cloud. This is because while a growing number of applications adopted by government are in the cloud, the underlying integration technologies connecting these applications are still based on-premise, meaning that government IT teams still have to spend time provisioning and maintaining infrastructure to ensure that their middleware doesn’t become a performance bottleneck for their applications. Join us for a conversation with MuleSoft CISO Kevin Paige on why cloud integration is key for agencies to succe
Tags : 
    
MuleSoft
Published By: Smarp     Published Date: Feb 22, 2019
By definition employee advocacy is the promotion of a company’s messages by its employees. Today, employee advocacy happens increasingly online, social media being the main medium for brand ambassadors. Employees have extensive networks of friends, followers, and connections on social media, and nowadays they can be reached and influenced with a click of a button. When empowered to act as brand ambassadors on social media, employees can share valuable content to their networks and build their professional brand all while increasing the company’s reach and credibility by generating meaningful conversations about the business.
Tags : 
employee advocacy, employee engagement, social media, social media visibility
    
Smarp
Published By: Marketo     Published Date: Feb 11, 2019
more conversational. Download our new Definitive Guide to Engaging Email, a jam
Tags : 
    
Marketo
Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business intelligence, business management, risk management
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showing the benefits of an RSA Averska IAM Solution.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business integration, business intelligence, risk management
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence, security, enterprise software
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
Tags : 
emc, rsa, ecat, enterprise compromise assessment tool, malware threats, malware detection, compromise assessment, compromise monitoring, security, enterprise software
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : 
emc, security threats, malware threats, malware protection, kill chain, rsa, defense, security, enterprise software
    
EMC Corporation
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, storage virtualization, mobile computing, wireless application software, wireless communications, data center
    
CDW Symantec
Published By: Payscale, Inc     Published Date: Apr 04, 2018
This is your crash course in the compensation language. Find all the terms you need to master any compensation conversation. You’ll be ‘comp’letely fluent in no time.
Tags : 
    
Payscale, Inc
Published By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 20, 2013
In this report, we examined the online conversations around Fashion Week in New York, London, Paris and Milan to find out exactly what makes fashion enthusiasts and buyers tick—and reveal trends and insights to help make fashion brands smarter.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputation monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework, security, data management
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
Tags : 
access management, iam, intelligence, business context, identity, security, data management
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning. Today’s organizations are demanding a business-centric approach to provisioning.
Tags : 
provisioning, risk, managing access, enterprises, security
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Tags : 
data breach, data access, governance, risk, prevention, security, data management
    
RSA
Published By: Oracle     Published Date: Oct 22, 2015
As many retailers know, fraud can be disguised by training issues and vice versa. So how do you determine fraud versus training issues and take institutional or tribal knowledge and build meaningful reports for end users? This e-book from Oracle Retail discusses the use case for expection-based reporting with specific examples and recommendations.
Tags : 
oracle retail, oracle, loss prevention, actionable insight, protecting profits
    
Oracle
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues, enterprise applications
    
Code42
Published By: Rsam     Published Date: Apr 28, 2016
The University of Rochester Medical Center (URMC) is of the nation’s top academic medical centers. Their InfoSec team wanted to implement a program that could withstand constant shifts in regulatory requirements while protecting the sanctity of patient health information. Learn why the selected Rsam and the results of their successful implementation.
Tags : 
rsam, university of rochester, security incident response, successful implementation, security, data management
    
Rsam
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.