RSS feed Get our RSS feed

News by Topic

act

Results 13476 - 13500 of 14319Sort Results By: Published Date | Title | Company Name
By: US Bank     Published Date: Feb 02, 2017
The average organization spends up to 10% of its annual budget on T&E, making it one of the largest controllable areas of discretionary spending. Combined with the fact that up to 90% of employee expenses are incurred on business trips each year, this means accurate expense management is more important than ever. Yet many organizations still rely on manual processes and paper-based tracking that can create serious expense management challenges for their finance teams: how can they control costs when they lack visibility into spending? Yet how can they increase visibility and control without sacrificing employee trust and empowerment? Streamlining expense management can help organizations save money, gain efficiencies and maintain control while increasing employee flexibility and freedom. But there’s no such thing as a “one size fits all” solution—different organizations require different solutions to meet their unique needs. However, when they start to consider their options, nearly
Tags : expense management, expense management automation, us bank, employee satisfaction, employee retention, employee connectivity, data security, employee rewards
     US Bank
By: UsedCisco.com     Published Date: May 14, 2008
An incredible array of organizations from both the public and private sector are buying pre-owned. These organizations include global public commercial enterprises, small businesses, ISP's, telecoms, non-profits, local and US government, military and educational institutions of all kinds. An overwhelming majority of the customers we've surveyed mention the same fact - they just didn't know pre-owned was a real, safe and viable option. In this guide, we'll present you with critical information you need to make the switch.
Tags : pre-owned, used, cisco, usedcisco, used cisco, green, cost, usedcisco.com
     UsedCisco.com
By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: ValueClick Media     Published Date: Sep 24, 2008
Based on a study conducted by ValueClick Media and interactive agency Goodway 2.0, this white paper evaluates networks as an alternative to advertising on automotive information sites. The study, which includes campaign data from Chevrolet, Dodge, Honda, Hyundai and Lincoln Mercury, concludes that running ads on a large number of sites and allowing optimization technology to determine those which are most effective will lead to better results than presupposing what sites or channels will perform.
Tags : automotive, chevrolet, dodge, honda, hyundai, lincoln mercury, advertising alternative, optimization technology
     ValueClick Media
By: Varicent Software Incorporated     Published Date: Dec 20, 2011
This model captures leading market characteristics and stages of innovation for the next three to five years in order to aid executives, managers and practitioners in planning SPM initiatives that best match corporate needs and capacities for implementing new technologies.
Tags : michael dunne, former gartner analyst, sales performance management, incentive compensation, variable pay, spm, icm, sales compensation
     Varicent Software Incorporated
By: Varicent Software Incorporated     Published Date: Dec 20, 2011
SPM solutions are becoming attractive, not only because early adopters are achieving success, but also because there is increasing pressure on compensation teams to deliver more. Organizations are demanding more than just accurate commission statements that are delivered on time. They need visibility, analysis and oversight into the entire variable compensation process; increasingly, they are relying on their sales operations, compensation and cross-functional teams to provide more sophisticated insights into what is working and what isn't.
Tags : sales performance management, incentive compensation, icm, spm, variable pay, pay for performance, key trends, error reduction
     Varicent Software Incorporated
By: Varonis     Published Date: Nov 12, 2013
Verizon’s longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.
Tags : varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security
     Varonis
By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : vasco, cloud computing, technology, saas applications, authentication, security
     VASCO
By: vCom Solutions     Published Date: Mar 08, 2013
Implications and Best Practices for Wireline & Wireless Expense Management in the SMB Market.
Tags : vcom, vcom solutions, telecom expense management trends, wireline & wireless expense, smb, (tem/wem) systems.ccmi
     vCom Solutions
By: Vectra Networks     Published Date: Aug 03, 2015
Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.
Tags : cyber attack, protection, security, network
     Vectra Networks
By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
     Vectra Networks
By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
     Vectra Networks
By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
     Vectra Networks
By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss, security
     Vectra Networks
By: Veeam     Published Date: Oct 03, 2011
Virtualizing Active Director DCs can make your life easier in the long run, download this white paper to start moving toward right configuration!
Tags : veeam software, veeam, virtualization, best practices, configure, configuration, design, greg shields
     Veeam
By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
     Veeam '18
By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
     Veeam '18
By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Whether you are running fleet maintenance using standalone software, pen and paper, or logging detailed spreadsheets, you may be missing a critical piece – the ability to receive real-time data from vehicles. That’s where telematics comes to play. There are hundreds of factors, both expected and unexpected, that could upend your day-to-day maintenance operations resulting in costly vehicle downtime and missed routes. While you can manage fleet preventive maintenance manually, investing in a software solution can automate much of the oversight and management process for fleet maintenance.
Tags : 
     Vehicle Tracking Solutions
By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Download to learn more about why you need to be proactive about fleet maintenance management.
Tags : 
     Vehicle Tracking Solutions
By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : live chat, live chat software, proactive live chat, online sales conversions, ecommerce, online customer experience, customer support productivity, online sales
     Velaro
By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
     Velaro
By: Vena Solutions     Published Date: Oct 29, 2018
As digitization drives business at ever-faster speeds, CFOs recognize the need to keep pace. They understand the importance of financial planning and analysis (FP&A) solutions that allow their finance teams to develop budgets and forecasts quickly and accurately. They need confidence in their numbers and the decisions they drive. But selecting the right FP&A software is only half the battle.
Tags : fp&a software, fp&a, financial planning and analysis, fp&a solutions, financial planning, financial analysis, fp&a process, fp&a implementation
     Vena Solutions
Start   Previous    533 534 535 536 537 538 539 540 541 542 543 544 545 546 547    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics