stats

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Colleges and universities are under cyber siege. In a recent attack, more than 2,500 student, alumni, and staff accounts were compromised at the University of Buffalo. This brief will teach you how to help prevent a data breach on your own campus.
Tags : 
    
Canon Solutions America
Published By: Cornerstone OnDemand     Published Date: Jul 09, 2019
Can you imagine having to convince company leadership to increase revenue? Well, that’s exactly what learning and HR leaders are having to do when it comes to investing in learning. Leadership just isn’t aware of the numbers that prove the business impact of learning on your company’s bottom line. Let Cornerstone help you build the case. Download of latest brief, “The business impact of learning”, and we’ll provide you with the stats and information you need to show why learning matters, why your company needs it, and what learning can do for your bottom line.
Tags : 
    
Cornerstone OnDemand
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Artemis Health     Published Date: Feb 05, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
    
Artemis Health
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to “Day One” challenges of deploying, managing and monitoring PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. An effective monitoring and logging strategy is critical for maintaining the reliability, availability, and performance of database environments. The second section of this eBook provides a detailed analysis of all aspects of monitoring and logging PostgreSQL: ? Monitoring KPIs ? Metrics and stats ? Monitoring tools ? Passive monitoring versus active notifications
Tags : 
    
Stratoscale
Published By: Lola Travel Company     Published Date: Jan 24, 2019
Think you can survive without a corporate travel policy, and continue having employees book trips on their own without harming your company? Think again. Check out this must-read e-book, "Do You Need a Corporate Travel Policy?" from Lola.com and learn: The 5 must-haves in a corporate travel policy Shocking stats about business travel impact on employee job satisfaction How to save time/money, lose stress with an employee-friendly travel policy Decide for yourself if a “wild west” business travel approach with “rogue employees” is smart for your business (hint: it’s not!). DOWNLOAD THE E-BOOK NOW!
Tags : 
    
Lola Travel Company
Published By: Uberflip     Published Date: Dec 20, 2018
In today’s world, marketers know that producing content isn’t enough. If they’re going to continue to make an investment in creating content, they need to do more to ensure it performs. We’ve long since known that combining content with a remarkable experience will allow it to reach its full potential, and allow marketers to see results. But as with any emerging category, content experience was not without its detractors. After all, what kind of results could you expect from an investment in the experience around that content? If you’ve ever wondered why you should care about content experience, and wanted something a little more concrete than a few anecdotes from marketers, or third-party stats, then look no further.
Tags : 
    
Uberflip
Published By: BMC ASEAN     Published Date: Dec 18, 2018
400+ IT professionals reveal what’s next for workload automation How are today’s leading companies using workload automation to drive their most important IT initiatives? Find out in this detailed report summary from analyst firm Enterprise Management Associates (EMA). You’ll learn how the role of workload automation is evolving, including: The rise of predictive analytics in WLA Surprising stats on the frequency and ease of migration How big data and cloud impact WLA The use of containers and micro services architectures Workload automation is changing fast. Keep up with the latest analyst research – download the report.
Tags : 
    
BMC ASEAN
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: First Advantage     Published Date: Apr 30, 2018
Know who you are hiring with these important background check stats and tips from First Advantage. Why background checks are necessary? Running a background check on a future employee is not only a smart idea, but can help protect your: reputation, customers & employees, business.
Tags : 
    
First Advantage
Published By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : 
pr strategy, marketing, digital age
    
TrendKite
Published By: DocuSign     Published Date: Apr 24, 2018
"We live in a world where the ability to do business digitally is a given. Now more than ever, people want to do business with organizations via the ease, speed, convenience and security of a fully digital experience. Yet many businesses are failing to keep pace in their front office with customer expectations, as well as with competitors that have made digital transformation a priority. Download this eBook to learn how B2B companies can evolve to meet customer expectations by adopting a fully digital experience with eSignatures. Some quick stats: - 87% of U.S. workers expect to be able to sign and purchase digitally - 75% of U.S. workers think that eSignatures are more secure than paper methods "
Tags : 
    
DocuSign
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Inforgraphic Includes fast facts such as: Average Attack Size
Tags : 
ddos, stats, trends, attacks
    
Akamai Technologies
Published By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : 
measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
    
NAVEX Global
Published By: Staples     Published Date: Jun 23, 2017
Every year, musculoskeletal disorders (MSDs) cost workplaces billions. See how attention to ergonomics can change that.
Tags : 
ergonomic, msd, improving productivity, musculoskeletal disorders
    
Staples
Published By: Optimizely     Published Date: Jun 05, 2017
Learn about statistical significance, statistical error, and the concepts behind Optimizely’s Stats Engine: - Best practices for running your experiments to statistical significance - Tips for communicating results, optimizing low-traffic pages, using confidence intervals, and more - How Optimizely is creating an always-valid view of statistical significance
Tags : 
optimizely, online experiments, statistics, statistical significance, optimizely stats engine
    
Optimizely
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
    
Lenovo and Intel®
Published By: Sprinklr     Published Date: Nov 22, 2016
A quick fact sheet that details the reach and audience of major messaging apps to help companies know which platform would be best suited to their audience.
Tags : 
messaging app research, messaging app data, social media data, social media intelligence, snapchat data, snapchat statistics, wechat data, wechat statistics, whatsapp statistics, whatsapp data, line statistics, line data
    
Sprinklr
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.