RSS feed Get our RSS feed

News by Topic

infographic

Results 301 - 325 of 471Sort Results By: Published Date | Title | Company Name
By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : endpoint security, security policy, mobile devices, security
     CDW-Trend Micro
By: Dell EMC     Published Date: Nov 03, 2015
View the infographic to see why head to head against the competition, Isilon wins every time.
Tags : emc, data storage, unstructured data, isilon, nas
     Dell EMC
By: Dell EMC     Published Date: Feb 08, 2016
Learn how XtremIO can help you consolidate all of your primary data and associated copies on a single, scale-out all-flash array.
Tags : emc, icdm, data management, xtremio, flash, storage
     Dell EMC
By: Avaya     Published Date: Jun 15, 2016
Discover the technological solutions to deliver better patient outcomes From patient satisfaction to mobility to security, technology’s role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Tags : technology, best practices, healthcare, info graphics, skyrocket
     Avaya
By: Oracle     Published Date: Apr 16, 2018
Infographic on where the financial services industry will be in 2022 with digital usage
Tags : financial, services, digital, industry, data
     Oracle
By: LogRhythm     Published Date: Apr 04, 2017
Download this infographic to learn about the 5 phases of a Ransomware Attack
Tags : 
     LogRhythm
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : cloud, cloud usage, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation
     McAfee
By: VMware     Published Date: Dec 18, 2012
Check out this infographic that explores SMB IT trends in virtualization and cloud computing to better understand the real-world advantage available to your growing business.
Tags : virtualization, cloud, server, cost, savings, infographic
     VMware
By: InsideUpbg     Published Date: May 21, 2015
I. What Exactly is a Vehicle Tracker II. Does My Business Need a GPS Tracking System? III. Saving Money IV. Compelling Reasons to Consider GPS Fleet Tracking (Infographic) V.10 Impotant Features of GPS Fleet Maintenance Software VI. Important Trends In GPS Tracking VII. Glossary
Tags : 
     InsideUpbg
By: VMware AirWatch     Published Date: May 18, 2016
Read this infographic to learn how EMM (Enterprise Mobility Management) empowers mobile users in becoming more productive.
Tags : mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
     VMware AirWatch
By: Cornerstone OnDemand     Published Date: May 15, 2015
This infographic shows how to guarantee employees reach their potential through applying a talent management strategy.
Tags : employee potential, talent management strategy, employee engagement, human resources, hiring, employee retention
     Cornerstone OnDemand
By: Bazaarvoice     Published Date: May 21, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : bazaarvoice, mobile, mobile consumers, mobile shoppers, web content, emerging marketing, marketing research, e-commerce
     Bazaarvoice
By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers
     Bazaarvoice
By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers
     Bazaarvoice
By: Cornerstone OnDemand     Published Date: Jul 15, 2015
In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk.
Tags : employee engagement, perks, flexibility, work environment, professional experience, talent retention
     Cornerstone OnDemand
By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : web threats, phishing, cyber attack, security, malware, web security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
     Webroot
By: McAfee     Published Date: Nov 12, 2014
This infographic outlines the results of the McAfee Phishing Quiz.
Tags : mcafee email phishing quiz, email phishing, spear phishing, security
     McAfee
By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : human capital management, talent management, workforce management, oracle, human resources
     Oracle
By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : human capital management, talent management, workforce management, oracle, human resources
     Oracle
By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : human capital management, talent management, workforce management, oracle, human resources
     Oracle
By: HP Enterprise Services     Published Date: Mar 25, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security
     HP Enterprise Services
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics