RSS feed Get our RSS feed

News by Topic

inform

Results 301 - 325 of 4228Sort Results By: Published Date | Title | Company Name
By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
     Limelight Network
By: Siteimprove     Published Date: Sep 03, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Möglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen über die Performance Ihrer Website erhalten. Füllen Sie einfach das Formular aus!
Tags : 
     Siteimprove
By: Siteimprove     Published Date: Sep 04, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Muglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen Uber die Performance Ihrer Website erhalten. Fullen Sie einfach das Formular aus!
Tags : 
     Siteimprove
By: Salesforce     Published Date: Oct 10, 2019
With unprecedented choice and access to information, today’s customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a “good” experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. What’s more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
     Salesforce
By: Salesforce     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
     Salesforce
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Dell     Published Date: Aug 11, 2015
As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Read this report for more information.
Tags : 
     Dell
By: Dell     Published Date: Nov 15, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel® Core™ i5-6300U processor performed compared to previous generations. • Starting computer and programs is 33% faster • Opening/using several applications at one time is 29% faster • Preparing a video is 18% faster How do these substantial performance improvements pay for themselves and make your employees happier? Read on.
Tags : windows, processors, laptop, system information, intel core
     Dell
By: Dell EMC     Published Date: Nov 09, 2015
The webinar is an excellent resource to provide attendees with the kind of comprehensive and collaborative perspective needed when exploring the implementation of big data solutions. The real-world examples provide information that can enable better decisions for designing best-of-breed big data solutions for organizations.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 09, 2015
This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform, highlights common data processing use cases and explores examples of specific use cases in vertical industries. The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell and its partners Cloudera and Intel.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell® and its partners Cloudera® and Intel®.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn how to big data more manageable while condensing vast amounts of information into actionable business insights.
Tags : 
     Dell EMC
By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: What data virtualization is and its benefits When and when not to use data virtualization How to deploy data virtualization to benefit your business How to unlock the value of your SAP data
Tags : virtualization, data, users, analytics, sql, application, access, directory
     TIBCO Software
By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. TIBCO® Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •?What data virtualization is and its benefits •?When and when not to use data virtualization •?How to deploy data virtualization to benefit your business
Tags : virtualization, data, users, analytics, sql, application, access, directory
     TIBCO Software
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •? What data virtualization is and its benefits •? When and when not to use data virtualization •? How to deploy data virtualization to benefit your business •? How to unlock the value of your SAP data
Tags : 
     TIBCO Software GmbH
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. TIBCO® Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •? What data virtualization is and its benefits •? When and when not to use data virtualization •? How to deploy data virtualization to benefit your business
Tags : 
     TIBCO Software GmbH
By: CA Technologies     Published Date: Oct 22, 2014
This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.
Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This White Paper provides information on how enhance delivery secure and improve customer experience.
Tags : security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.
Tags : byod, identity, byoid benefits
     CA Technologies
By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services
     CA Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics