RSS feed Get our RSS feed

News by Topic

cia

Results 1 - 25 of 4345Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : cloud security, data, akamai
     Akamai Technologies
By: SAP     Published Date: Apr 03, 2017
Inside Constellation’s Series on Innovation in Financial Management Applications in the Cloud.
Tags : financial management, hcm, cloud, cloud applications, erp, financial planning, cloud
     SAP
By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion
     KeyBank Commercial Banking
By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
     Schneider Electric
By: Quantum     Published Date: Jun 20, 2017
In the past, the production of professional quality corporate videos was delegated to outside agencies. Corporate business units hired marketing firms and video production houses because those outside agencies were the only ones with both the required expertise and the expensive equipment needed to generate high-quality results. Quantum teamed up with the Communications Media Management Association (CMMA) to survey their members—media production managers from leading enterprises—to learn more about the benefits and challenges of creating video in-house. Download the eBook, “The Changing Landscape of Corporate Video Production” to get the following questions answered and more: • Will in-house creative teams continue to ramp up in production? • What video formats are they currently producing and delivering? • How are they archiving their content? • What challenges are in-house teams facing as they generate more content? Today, that is changing. As the cost of video production technology drops, more corporations are recognizing the value of bringing production in-house. According to a recent report by Vidyard, 85% of businesses surveyed now have internal staff and resources producing videos in-house.
Tags : change, landscape, corporate video production, quantum
     Quantum
By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
     Entrust Datacard
By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
AEW Energie, en Suisse, utilise l’infrastructure hyperconvergée pour réduire le temps de gestion et permettre au personnel de se concentrer sur les tâches spécialisées.
Tags : case study, hyper-converged infrastructure, hyperconvergence, cut costs, time management
     DellEMC and  Intel® Xeon® processor
By: IBM APAC     Published Date: May 18, 2017
In today’s always on world, IT systems are so interdependent with business operations that even a few minutes of downtime can have big implications—for your productivity, reputation and finances. New technologies like cloud, mobile, analytics and social can help your business be more flexible and responsive, but at the same time they increase your risk.
Tags : ibm, tss, cloud, mobile
     IBM APAC
By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
     Entrust Datacard
By: Adobe     Published Date: Mar 21, 2017
Every part of your customers’ experience counts, especially when they’re researching and shopping around for where they want to put their money. It’s one of the most emotional and complex of all consumer decisions. That’s because money matters. Banking. Investing. Insurance.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Financial Services and Insurance report is based on a sample of almost 850 FSI respondents1 who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
     Adobe
By: MarkLogic     Published Date: Jun 09, 2017
NoSQL means a release from the constraints imposed on database management systems by the relational database model. This quick, concise eBook provides an overview of NoSQL technology, when you should consider using a NoSQL database over a relational one (and when to use both). In addition, this book introduces Enterprise NoSQL and shows how it differs from other NoSQL systems. You’ll also learn the NoSQL lingo, which customers are already using it and why, and tips to find the right NoSQL database for you.
Tags : 
     MarkLogic
By: MarkLogic     Published Date: Jun 09, 2017
This eBook explains how databases that incorporate semantic technology make it possible to solve big data challenges that traditional databases aren’t equipped to solve. Semantics is a way to model data that focuses on relationships, adding contextual meaning around the data so it can be better understood, searched, and shared. Read this eBook, discover the 5 steps to getting smart about semantics, and learn how by using semantics, leading organizations are integrating disparate heterogeneous data faster and easier and building smarter applications with richer analytic capabilities.
Tags : 
     MarkLogic
By: Oracle (Hospitality)     Published Date: Mar 28, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasn’t begun to be tapped — especially by hoteliers. If seen as a gateway to operational efficiency, enhanced guest experiences and, most importantly, a better bottom line, mobility wouldn’t be overlooked. Which is exactly why it’s time to view it through a different prism — or risk being left behind by your competitors who will.
Tags : mobility, mobile, hoteliers, guest experience, oracle
     Oracle (Hospitality)
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® per nuove, infinite possibilità.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® pour de nouvelles possibilités.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside®. Neue Möglichkeiten Outside.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
     iCims
By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
     MobileIron
By: Oracle (Hospitality)     Published Date: Apr 13, 2017
For hospitality leaders, anticipating consumer trends and seeking innovations that enhance guest experiences are vital exercises that need to be practiced diligently. Now, more than ever – with the coming wave of disruptive technologies – taking these steps helps ensure success tomorrow.
Tags : hospitality, artificial intelligence, facial recognition, customer experience, restaurants, 3d printing
     Oracle (Hospitality)
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: Workday     Published Date: Mar 01, 2017
The financial system you are running today can likely trace its heritage back to the 80s and 90s. The needs of finance organizations have changed dramatically. If you’re considering a new financial management system, read the whitepaper to learn the six must-haves it must include. Segment
Tags : 
     Workday
By: Workday     Published Date: Mar 01, 2017
Now is a time of major disruption in the financial business applications markets. In the new report, “Predicts 2016: Financial Management Applications,” Gartner explains how financial management applications are going through a period of significant change, due to shifting enterprise priorities and evolving technology.
Tags : 
     Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics