RSS feed Get our RSS feed

News by Topic

person

Results 51 - 75 of 1815Sort Results By: Published Date | Title | Company Name
By: Lenovo UK     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Alors que le coût moyen d’une violation de données s’élève aujourd’hui à plus de 4 millions de dollars, découvrez les retombées directes d’une bonne sécurité sur votre croissance. Téléchargez l’infographie >
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Dans un contexte où 48 % des compromissions sont dues à des erreurs humaines2, découvrez comment protéger votre entreprise contre les menaces internes. Téléchargez notre infoguide > 2 Kaspersky : “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Remarque : il manque un "s" à "Kaspersky" dans les références de l’infoguide]
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree più a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360°. Servono in media 23 giorni per riemergere da un attacco ransomware1, scopri perché una soluzione di sicurezza IT è la risposta a questo problema. Scarica la guida alle soluzioni > 1 IBM: 2017 Global CODB Report Final (
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree più a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360°. Il costo medio di una violazione dei dati è di oltre 4 milioni di dollari, scopri perché gli investimenti in sicurezza garantiscono crescita alla tua azienda. Scarica l'infografica >
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree più a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360°. Considerando che il 48% delle violazioni è causato da errori umani2, come proteggere il tuo business dagli errori dei dipendenti? Scarica la guida informativa > 2 Kaspersky: "Small Business IT Security Practical Guide" https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Nota: nella guida informativa manca una s in Kaspersky nelle informazioni sulle fonti]
Tags : 
     Lenovo UK
By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand:
Tags : 
     Amazon Web Services EMEA
By: Dell EMEA     Published Date: Sep 09, 2019
Ingen kan jämföra sig med Dell när det kommer till livslängd. Våra maskiner har inte bara kapacitet, hanterbarhet och säkerhetsfunktioner som IT-avdelningen kan lita på, de är dessutom utformade för en lång livscykel vilket minskar avfalls- och återvinningskostnader. Det är inte konstigt att de har funnits så länge. Så ser bakgrunden ut, men hur är det med framtiden? Latitude 7400 2-i-1 använder den nya Dell Express-inloggningen. Den upptäcker att användaren är där, väcker systemet på ungefär en sekund och loggar in användaren med ansiktsigenkänning och Windows Hello. Användaren kan bara sätta sig vid skrivbordet och börja jobba, utan att behöva trycka på control-alt-delete eller sträcka sig till strömbrytaren. Det är faktiskt världens första PC som använder en närhetssensor driven av Intel® Context Sensing Technology. När användaren tar en paus upptäcker Latitude att personen har gått iväg och låser sig själv för att spara på batteriet och skydda datorn. Ladda ner det nu om du vill
Tags : 
     Dell EMEA
By: Marketo     Published Date: Sep 03, 2019
Your website is the hub of interaction between your company and your customers, and in an increasingly competitive digital landscape, today's buyers aren't simply looking for a one-size-fits-all customer experience. Web personalization empowers you to provide more relevant experiences to online visitors and speak to them with personalized messages at scale. It enables you to communicate across all marketing channels with a consistent voice and user experience that builds trust, engagement, revenue, and loyalty. In this ebook, discover how to: Integrate web personalization into your marketing strategy Incorporate cross-channel marketing in your web personalization strategy Create content to maximize the impact of personalization Leverage AI and machine learning to provide personalized web content Measure impact and success Choose the right web personalization tool for you Build a website that accelerates engagement, conversion, and retention by downloading the Introductory Guide to
Tags : 
     Marketo
By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
     Gigamon
By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
     Akamai Technologies
By: 3M     Published Date: Aug 30, 2019
The prevalent use of paints and coatings across many industries and organizations presents a variety of workplace hazards. In many cases, selection and use of appropriate personal protective equipment (PPE) is necessary to help control exposures. Respiratory and skin contact hazards are common across most applications. Depending on the type of paint or coating and the specific use conditions, other hazards may be present. These can include fire and explosion hazards, electric shock, fall hazards, excessive noise and other. Prior to selecting PPE for any painting operation, a hazard assessment completed by a qualified health and safety professional is necessary to evaluate exposure risks potentially present.
Tags : 
     3M
By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
     Experian
By: MicroStrategy     Published Date: Aug 28, 2019
Over the last decade, the enterprise analytics landscape has dramatically transformed. Vendors have come and gone, and platforms have continually expanded their offerings to include new functionality and keep pace with the demands of the businesses they serve. Originally envisioned as an IT-centric tool for enterprise reporting, analytics today has evolved into a business solution—empowering a range of users across every line of business, including front-line employees, field personnel, and executives. The rise of self-service analytics over the past decade has played a key role in promoting a data-driven mindset within every business function. However, this practice is limited to a skilled few. The vast majority of business professionals lack the time, analytical skills, or inclination to conduct their own analyses, and fail to effectively use analytics on a day-to-day basis. The result? Despite decades of investments, BI adoption at most organizations remains at 30%. The failure of e
Tags : 
     MicroStrategy
By: FICO EMEA     Published Date: Aug 28, 2019
There is a proliferation of payment methods that provide people with faster ways to make and receive payments – but they are not all the same. Understanding the differences and unique characteristics of different 'fast' payment types is vital to those who need to develop and service payments fraud strategy. Download our executive brief to understand: The differences between real-time payment schemes, e-wallets and person to person payments The implications on fraud from the fast transfer of money Where to start building your real-time payments fraud strategy
Tags : real-time payment, p2p payment
     FICO EMEA
By: The Economist Group     Published Date: Aug 28, 2019
In a digital world, customers expect banks to connect all the dots and deliver omnichannel experiences that are seamless, personalized, and yes, delightful. Whether your customers visit branch locations or engage on mobile apps, it’s essential that at the enterprise level, you're able to understand and anticipate their needs. Understanding your data is key to this kind of responsiveness. When you’re able to harness data and segment customers in new and exciting ways, target the right markets, and offer relevant products at the right time you can drive new opportunities, generate new revenue streams, and increase the value of every customer. To find out more download this whitepaper today.
Tags : 
     The Economist Group
By: Kustomer     Published Date: Aug 27, 2019
One of Away’s core values is being “customer-obsessed”. But Away’s customer service agents had to constantly switch between systems to get the information they needed. Learn how Kustomer enabled them to deliver best-in-class customer experience, in real time.
Tags : “customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”
     Kustomer
By: Kustomer     Published Date: Aug 27, 2019
Your customers crave and deserve a stellar customer service experience. Learn three ways to deliver personalized support and earn lifelong brand loyalty.
Tags : customer service, customer support, customer experience, customer service software, conversational commerce, personalized customer service, customer service personalization, personalized customer support
     Kustomer
By: Kustomer     Published Date: Aug 27, 2019
Your customers crave and deserve a stellar customer service experience. Learn three ways to deliver personalized support and earn lifelong brand loyalty.
Tags : “customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “personalized customer service”, “customer service personalization”, “personalized customer support”
     Kustomer
By: Spectrum Enterprise     Published Date: Aug 22, 2019
Hello, greetings, and welcome to Conversational Unified Communications. I’m Brien Posey. For those of you who don’t know me, I am a long time Conversational Geek author, and 17-time Microsoft MVP. My professional background is in both IT and in commercial astronautics. It’s an odd combination for sure. I sometimes find myself setting up virtual machines on one day, and being strapped into a space capsule the next day (seriously). Thankfully, Peter, Nick, and the rest of the folks at Conversational Geek have embraced my unorthodox (dare I say eccentric) career choices and have allowed me to author books on subjects ranging from the cloud computing to real life rocket science. I would like to personally invite you to go to ConversationalGeek.com and check out some of these other books. In this book, I want to talk about unified communications. Those of you who follow my work may recall that back in 2009 I wrote another book about unified communications called Brien Posey’s Guide to Pract
Tags : 
     Spectrum Enterprise
By: The Economist Group     Published Date: Aug 22, 2019
In a digital world, customers expect banks to connect all the dots and deliver omnichannel experiences that are seamless, personalized, and yes, delightful. Whether your customers visit branch locations or engage on mobile apps, it’s essential that at the enterprise level, you're able to understand and anticipate their needs. Understanding your data is key to this kind of responsiveness. When you’re able to harness data and segment customers in new and exciting ways, target the right markets, and offer relevant products at the right time you can drive new opportunities, generate new revenue streams, and increase the value of every customer. To find out more download this whitepaper today.
Tags : 
     The Economist Group
By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
     Apstra
By: ServiceSource     Published Date: Aug 14, 2019
Dive into our latest whitepaper “Architecting Your Customer’s Success,” where we outline a step-by-step guide to creating personalized customer success plans that result in more positive and profitable outcomes for your customers, along with increased retention rates and revenue for your own business.
Tags : 
     ServiceSource
By: SES     Published Date: Aug 14, 2019
Dive into our latest whitepaper “Architecting Your Customer’s Success,” where we outline a step-by-step guide to creating personalized customer success plans that result in more positive and profitable outcomes for your customers, along with increased retention rates and revenue for your own business.
Tags : 
     SES
By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
     Limelight Network
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Employees in every industry are expected to work quickly, but they’re often frustrated by company-issued apps. As a result, they’re downloading personal apps to get the job done instead of using secure, enterprise-approved tools. It’s called shadow IT, and it’s gaining traction fast.
Tags : 
     Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics