RSS feed Get our RSS feed

News by Topic

act

Results 13376 - 13400 of 14372Sort Results By: Published Date | Title | Company Name
By: Tripwire     Published Date: Jun 30, 2009
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox Compliance."
Tags : tripwire, sustain, sox, compliance, practice, risk, control, data
     Tripwire
By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : tripwire, information security, audit fatigue, compliance, security risk
     Tripwire
By: Tripwire     Published Date: Jan 20, 2010
Gene Kim, CTO of Tripwire, describes seven practical steps owners and operators of the bulk power system can take to meet the mandatory IT configuration requirements set forth in the NERC-CIP standards. These steps help owners and operators avoid costly penalties for non-compliance while also protecting the Critical Cyber Assets that control or affect the reliability of North America's bulk electric power system.
Tags : tripwire, gene kim, nerc compliance, critical infrastructure protection, cip, cyber security standards, nerc-cip standard, information security
     Tripwire
By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : tripwire log center, event management, security event analysis, database, graphical tool, centralized dashboard, activity monitoring, security alert
     Tripwire
By: Tripwire     Published Date: Nov 07, 2012
Properly configuring security parameters on servers, workstations and network infrastructure platforms has been a mandatory of best practices in information security. Read this white paper to learn how secure configurations can reduce overall attack.
Tags : secure configuration, tripwire, information security, data security, network infrastructure platforms
     Tripwire
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management
     Tripwire
By: Tripwire     Published Date: Jan 29, 2013
Download this paper to learn five actions that will enhance your approach to information risk management and security and help you stay one step ahead of the information age adversary.
Tags : risk management, irms, it security, security
     Tripwire
By: Tripwire     Published Date: Feb 08, 2013
Continuous monitoring is not a single solution—it’s a best practice for IT security.
Tags : automation, continuous monitoring, security, threat detection, threat prevention, hacker, malware, cyber attack
     Tripwire
By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management
     TRIRIGA
By: TRIRIGA     Published Date: Jul 27, 2007
Leaders in every industry perform sale-leaseback transactions to unlock the value of real estate, improve the balance sheet and realize tax benefits. The paper discusses how sale-leasebacks enhance financial ratios, elevate operations and re-focus real estate strategies on profitability rather than logistics.
Tags : sales-leaseback, sale-leaseback, sales leaseback, sale leaseback, real estate, balance sheet, tax benefits, leased properties
     TRIRIGA
By: TRIRIGA     Published Date: Mar 31, 2008
Investments in green building strategies consistently result in significant benefits for organizations today.  Green buildings not only reduce the environmental impacts of natural resource consumption and green house gas emissions, but they also provide economical benefits such as reduced costs, improved bottom-line performance and higher shareholder value.
Tags : green building, tririga, environmental sustainability, dr. romm, tririga, environmental impact, green house gas emissions, emissions
     TRIRIGA
By: Tririga     Published Date: Nov 10, 2011
This white paper covers the primary findings from the Sustainable Asset Management Survey conducted by TRIRIGA and Gartner.
Tags : sustainability, strategies, tactics, tririga, gartner, energy, environmental programs, facilities
     Tririga
By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : data quality, data protection, data improvement, improve data, trituns, trituns innovation
     TriTuns Innovation
By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data
     TruSignal
By: TRUSTe     Published Date: Oct 28, 2008
See how Cheapflights improved lead quality while gathering over one million opt-in newsletter registrations and increasing monthly site registrations by 26%.
Tags : truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste
     TRUSTe
By: TRUSTe     Published Date: Sep 16, 2009
Put yourself in the customer's shoes: when shopping online, what are the things that worry you most? Before you enter your name and email address do you think about spam clogging your inbox? If you are like most consumers, you check to see if the site bears the seal of a third-party verification program and if the site has a privacy policy.
Tags : truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter
     TRUSTe
By: TRUSTe     Published Date: Oct 12, 2009
A case study showing how the TRUSTe seal helped boost retail conversions for debnroo.com.
Tags : privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales
     TRUSTe
By: TRUSTe     Published Date: Jul 24, 2009
Whether registering for downloads or e-newsletters, re-ordering or renewing, or telling their friends, customers who feel more confident to click, learn, and shop online, spend more. See how Truste privacy products and programs have helped businesses of all sizes increase conversions, order value, and customer engagement throughout the customer lifecycle.
Tags : truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste
     TRUSTe
By: TRUSTe     Published Date: Aug 31, 2009
TRUSTe works to advance privacy and trust for a networked world. TRUSTe Privacy Seals help consumers click with confidence by guiding them to trustworthy Web sites. Thousands of Web sites rely on TRUSTe industry best practices to help them make the right decisions about privacy and protecting confidential user information. Most of the top fifty Web sites are certified to TRUSTe's leading practices, including Yahoo, Facebook, MSN, eBay, AOL, Disney, New York Times, Comcast and Apple. To learn more about internet privacy visit www.truste.com.
Tags : truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter
     TRUSTe
By: TRUSTe     Published Date: Mar 10, 2009
A case study explaining why JungleSource views TRUSTe as core enabler to their business.
Tags : privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales
     TRUSTe
By: TRUSTe     Published Date: Nov 17, 2009
Best Practices, Do's, and Don'ts for Facebook, Twitter, as well as consumer review sites. TRUSTe shares insights into how to engage, interact, market, and reward friends and fans on the top social media platforms. Download to see how you can increase business on social media today.
Tags : conversion rates, lead quality, response rates, ecommerce, lead generation, demand generation, conversion rates, privacy
     TRUSTe
By: TRUSTe     Published Date: Jun 02, 2010
Ecommerce, Web Development and Design, and Direct Marketing professionals can take advantage of a new program designed to gauge your organization's privacy level. Thousands of companies leave the intricacies of privacy management to TRUSTe, 13 year old leader in online privacy. Gain an overview of the program today.
Tags : truste, ecommerce, privacy, security, coppa, transactions, a/b, optimization
     TRUSTe
By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
     TRUSTe
By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps, content management systems
     TRUSTe
By: TRUSTe     Published Date: Dec 08, 2010
Businesses are constantly looking for ways to increase website traffic through marketing and drive more sales through their webstore.
Tags : truste, drive website traffic, sales and marketing, tactical strategy, interactive/pr agencies, interactive marketing, web analytics, managed hosting services
     TRUSTe
Start   Previous    529 530 531 532 533 534 535 536 537 538 539 540 541 542 543    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics