RSS feed Get our RSS feed

News by Topic

graph

Results 701 - 725 of 1038Sort Results By: Published Date | Title | Company Name
By: Cornerstone OnDemand     Published Date: Jul 15, 2015
In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk.
Tags : employee engagement, perks, flexibility, work environment, professional experience, talent retention
     Cornerstone OnDemand
By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : web threats, phishing, cyber attack, security, malware, web security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
     Webroot
By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net
     Sybase PowerBuilder
By: McAfee     Published Date: Nov 12, 2014
This infographic outlines the results of the McAfee Phishing Quiz.
Tags : mcafee email phishing quiz, email phishing, spear phishing, security
     McAfee
By: Silver Peak     Published Date: Oct 28, 2013
In recent years, data deduplication has made its ways from the storage to the networking community. More specifically, it has become an important tool for optimizing application performance across the WAN. By eliminating the transfer of repetitive IP traffic, deduplication significantly improves WAN utilization and accelerates data transfers between geographically disperse locations. This saves bandwidth costs and helps to overcome many obstacles when communicating across a WAN. This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions.
Tags : wan, silver peak, deduplication, storage
     Silver Peak
By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : human capital management, talent management, workforce management, oracle, human resources
     Oracle
By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : human capital management, talent management, workforce management, oracle, human resources
     Oracle
By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : human capital management, talent management, workforce management, oracle, human resources
     Oracle
By: Marketo     Published Date: Mar 13, 2014
In order for enterprise companies to be successful in today’s economy, sales and marketing teams must be aligned. Both departments must come together to develop strategies, processes and best practices to pave the foundation for collaboration. Understanding what marketing will provide and what to expect from sales is the first step. Use this playbook to begin your aligned lead generation efforts today.
Tags : marketo, sales, marketing, collaboration, sales tactics, lead generation, revenue success, team integration
     Marketo
By: HP Enterprise Services     Published Date: Mar 25, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security
     HP Enterprise Services
By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : f5 networks, ddos, ip security, real time attack, data protection, secure business
     F5 Networks
By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr
     Soonr
By: ReadyTalk     Published Date: Jul 07, 2016
By now, most people have had the experience of attending a webinar. An attendee logs on, and spends a certain amount of time listening to audio and viewing a slide presentation. It is likely that attendees will interact via online polling and ask questions during the presentation. Hopefully they will leave the experience with a few takeaways. Webinars have proven to be a great marketing tool, as well as a valuable way to connect people in various geographic locations to information. But, how much of the webinar do attendees actually listen to?
Tags : best practices, business optimization, business management, productivity, engagement practices
     ReadyTalk
By: HP AppPulse Mobile     Published Date: Jun 05, 2015
HP has developed a fast, easy method to measure and monitor the user experience in a truly meaningful way: from the user’s perspective. It’s called “FunDex,” a single score from 0 to 100 that encapsulates the average overall user experience. This paper will show you how to measure and monitor your FunDex.
Tags : user experience, customer satisfaction, mobile, infographic
     HP AppPulse Mobile
By: WePow     Published Date: Sep 02, 2015
Online video use has grown by huge numbers over the past few years and isn't showing any signs of slowing down. Beyond personal lives, the impact it is having on the way we do business and more specifically talent management can't be argued. Check out WePow's latest infographic on video trends in 2015.
Tags : video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips
     WePow
By: VMware AirWatch     Published Date: Dec 08, 2016
"VMware is changing how you think about desktop transformation with a brand new approach that uses cloud-based management, intelligent orchestration, and hyper-converged infrastructure to deliver and manage desktops and apps. VMware Horizon® Air™ Hybrid-mode unifies on-premises and cloud-based virtual workspace services into a single, cost-eff­ective platform that's faster to install, easier to deploy, and eff­ortless to scale. Download this infographic to learn more.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Feb 21, 2017
VMware is changing how you think about desktop transformation with a brand new approach that uses cloud-based management, intelligent orchestration, and hyper-converged infrastructure to deliver and manage desktops and apps. VMware Horizon® Air™ Hybrid-mode unifies on-premises and cloud-based virtual workspace services into a single, cost-eff­ective platform that's faster to install, easier to deploy, and eff­ortless to scale. Download this infographic to learn more.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware AirWatch
By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
     Microsoft Office 365
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics