rsa

Results 1 - 25 of 575Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: Uberflip     Published Date: Jan 03, 2019
No matter what industry you’re in or role you have, we all share a universal interest in trends. As marketers, we look to Google Trends to understand what keywords and search terms are most popular; we look for trending hashtags and conversations on social to inform the content we put out; and we put “Trends” sessions on our agendas at conferences because we know they’ll draw an audience. We’ve tapped into this almost universal desire to understand what the masses are doing.
Tags : 
    
Uberflip
Published By: Cleversafe     Published Date: Dec 07, 2012
Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs
Tags : 
shutterfly, images, growing, reliability, performance, storage, dispersal, networking
    
Cleversafe
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: LogMyCalls     Published Date: Oct 20, 2014
We analyzed millions of calls in Q1, and there's gold to be mined out of every customer conversation, data that will improve marketing.
Tags : 
call tracking, conversation analytics, marketing analytics, business intelligence, big data, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mitarbeiter von heute sind es gewohnt, privat digitale Technologien zu nutzen, die eine problemlose Kommunikation ermöglichen und die Abläufe des täglichen Lebens vereinfachen. Bedauerlicherweise können viele Unternehmenstools nicht Schritt halten. Die meisten Projekt- und Portfoliomanagementlösungen, die heute eingesetzt werden, bieten keine unkomplizierten Optionen, um alltägliche Aufgaben auszuführen. Sie ermöglichen keine kontextbasierte Kommunikation, mit der sich Probleme lösen lassen, und verfügen nicht über entscheidende Funktionalität. Dazu zählen z. B. die Möglichkeit, den Fokus auf relevante Daten einzuschränken, das Durchführen von Drilldowns, um zusätzliche Informationen zu erhalten, sowie die Vorhersage finanzieller Entwicklungen und das Modeling von Ergebnissen.
Tags : 
    
CA Technologies EMEA
Published By: Brightcove     Published Date: Sep 26, 2016
Enable valuable digital dialogues through a combination of marketing automation, interactive video, and personalized content. Intelligently crafting these elements of your campaign, while effectively integrating the tech stack tools that empower 1:1 conversations (OVP, MAP, and CRM), can create a remarkable video marketing strategy.
Tags : 
    
Brightcove
Published By: Oracle_Hospitality Hotels     Published Date: Sep 26, 2016
Enable valuable digital dialogues through a combination of marketing automation, interactive video, and personalized content. Intelligently crafting these elements of your campaign, while effectively integrating the tech stack tools that empower 1:1 conversations (OVP, MAP, and CRM), can create a remarkable video marketing strategy.
Tags : 
    
Oracle_Hospitality Hotels
Published By: Jobvite     Published Date: Oct 02, 2013
Social recruiting has grown up and has seen universal adoption across industries. Anyone not leveraging social referrals is behind the curve. Download Jobvite's 6th Annual Social Recruiting Survey Results to see how your social recruiting strategy compares
Tags : 
social recruiting, social recruiting survey, survey results, employee referrals, social referrals, human resources
    
Jobvite
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
    
Avi Networks
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer service organizations are struggling to react to the pace of innovation and the explosion of channels and devices. To get ahead of these challenges, AD&D pros must deeply invest in automation — automated answers, automated conversations, automated agent guidance, and automated end-to-end processes. They must also invest in intelligence to ensure automated technologies evolve and learn from prior interactions over time. Automation and intelligence quell the headcount increases. They will free agents from working on low-value or repetitive tasks, as they will only have to address highly complex customer scenarios or exceptions to standard operations. This also enables them to focus on building connections with customers to garner their satisfaction and loyalty.
Tags : 
customer, service, operations, optimization
    
LogMeIn
Published By: Avi Networks     Published Date: Mar 06, 2018
Are your load balancing strategies up to date? Download our guide to assess your current capabilities and understand where your focus should be. Included in this year's report is research, best practices, and conversations with teams at over 180 Global 2000 companies.
Tags : 
    
Avi Networks
Published By: Brainshark     Published Date: Dec 08, 2015
Sales conversations are happening every day. Are YOUR reps ready? This exclusive eBook provides tips and ideas for improving sales readiness across your organization.
Tags : 
sales enablement, sales readiness, sales training, sales force strategies, sales best practices, sales training secrets
    
Brainshark
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi, human resources
    
CEB
Published By: MindTouch     Published Date: Mar 18, 2019
Improving contact center efficiency remains a top priority for most service professionals. Yet, the impetus for doing so has shifted from a conversation about cost toward a greater focus on the customer experience. The reason is simple: contact center efficiency costs are intertwined with the customer experience. Increasingly, controlling cost in the contact center depends on the extent to which an organization can meet the growing demand for A+ customer self-service experiences. When I have a question, customers now ask, is it quick and easy to find an answer? Three important pillars of contact center efficiency now depend on the answer to this question.
Tags : 
    
MindTouch
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
Sponsorships can be more than a logo placement. In fact, they should be. Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. Still need proof social is the way to go? We’ll give you 1,700 reasons. That’s the number of banner ads consumers get served every month. On top of that, people are (over) exposed to more than 16,000 commercials annually – and struggle to recall any. It’s not an exaggeration to say consumer attention is fragmented. So how can you ensure the packages you sell create affinity between brands and the consumers they desperately covet? By giving everyone a chance to connect with each other. After all, your audience is probably already talking about your event on Facebook, Twitter and Instagram. Download here to learn more!
Tags : 
spredfast, social media, sponsorship, banner ads, earned media
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
Sponsorships can be more than a logo placement. In fact, they should be. Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. Still need proof social is the way to go? We’ll give you 1,700 reasons. That’s the number of banner ads consumers get served every month. On top of that, people are (over) exposed to more than 16,000 commercials annually – and struggle to recall any. It’s not an exaggeration to say consumer attention is fragmented. So how can you ensure the packages you sell create affinity between brands and the consumers they desperately covet? By giving everyone a chance to connect with each other. After all, your audience is probably already talking about your event on Facebook, Twitter and Instagram. Download here to learn more!
Tags : 
spredfast, social media, sponsorship, banner ads, earned media
    
Spredfast, Inc.
Published By: GoToWebinar     Published Date: Oct 08, 2013
There are a few simple things you can do before, during and after a webinar that will leave your attendees talking for days. If you want to have a lively event, get the conversation started early. This brief provides an easy step-by-step guide that will make your online event more engaging, valuable and effective.
Tags : 
citirx, whitepaper, go to webinar, citrix, webinar preparation, productivity
    
GoToWebinar
Published By: EMC     Published Date: Apr 18, 2013
See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.
Tags : 
business continuity, disaster recovery, encryption, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, patch management, security management, vulnerability management
    
EMC
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Much has been written about how to understand and work with millennials—but it's been from the perspective of forcing this group of tech-savvy and connected people into old ways of working. But consider this: by 2020, millennials will make up 50% of the workforce. Also consider: the way we work changes almost daily. That means it's time to rethink the entire conversation about working with millennials. In this eBook, learn 4 ways to motivate millennials in the workplace—and how the right technology plays a critical role.
Tags : 
    
Microsoft Office 365
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
IDC empfiehlt Unternehmen, die ihre IT-Umgebungen modernisieren und operative Risiken, die Kosten verursachen können, begrenzen möchten, Data-Protection-Initiativen höchste Priorität einzuräumen. Um Ihre IT wirklich zu transformieren, modernisieren Sie Ihr Rechenzentrum, um die IT-Effizienz zu steigern. Befreien Sie sich aus Ihren technischen Abhängigkeiten und schützen Sie gleichzeitig Ihre Erträge. Treiben Sie die IT-Transformation voran und erzielen Sie Ergebnisse mit führenden Unternehmenslösungen von Dell EMC, powered by Intel®.
Tags : 
    
Dell EMC & Intel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.