RSS feed Get our RSS feed

News by Topic

reach

Results 1 - 25 of 1159Sort Results By: Published Date | Title | Company Name
By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
     Carbon Black
By: Groove     Published Date: May 16, 2018
Build.com is a well-established online retailer of home improvement products. Their sales team was stretched thin, and they needed a way to ensure accurate records in Salesforce in a way that didn’t hurt overall sales and customer outreach. While they were initially drawn to Groove for the Salesforce Email Sync, they soon discovered more ways to turbocharge their sales effort with personalizable drip campaigns through Flow.
Tags : 
     Groove
By: Groove     Published Date: May 16, 2018
From equipping them with accurate data to efficiency-driving tools to impactful training, you want to find the best systems to help your reps soar. As the market floods with technology (and a lot of lofty claims), it may be tough to know what you actually need and where to start your research process to help — not hinder — your team. You’ve probably heard a lot of buzz about sales engagement platforms, and there are quite a few to choose from. But what is it? What does it do? In sales, time is money. If you find that your team’s time is tied up in manual or administrative tasks, consider looking into a sales engagement platform. The right sales engagement platform will power outreach quality and quantity, ultimately helping your team crush their goals and boost the bottom line. In this guide, we’ll help you think through what features you should look for and what questions to ask as you begin to compare your options.
Tags : 
     Groove
By: IBM     Published Date: Apr 13, 2018
New survey reveals the challenges organizations face in integrating data and their priorities for improving data integration.
Tags : data integration, data, cloud
     IBM
By: Mimecast     Published Date: Apr 13, 2018
In February 2018, mandatory database laws went into effect in Australia. ultimately these laws are about protecting average Australians’ data from criminal organizations. Equifax and the Red Cross were recent victims of these attacks. Watch now to learn more about how these laws will affect your business as you make changes to protect your customers’ data.
Tags : 
     Mimecast
By: Mimecast     Published Date: Apr 13, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
     Mimecast
By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
     Mimecast
By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
     Mimecast
By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : internet, security, cryptocurrency, data, breaches, botnet
     Akamai Technologies
By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
     Google Chrome Enterprise
By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
     CA Technologies EMEA
By: FICO     Published Date: Apr 07, 2018
High profile data breaches such as those at Equifax and MyFitnessPal have made everyone aware of cyber-risk. It is not only the cyber-risk that exists within your business you need to assess – do you understand the risk you inherit from the businesses you work with such as your: -Suppliers -Customers -Acquisitions and mergers For vital information about why you should assess the different types of organization you work with; and to learn how you can do this quickly and easily - Read our guide ‘Why Should You Understand the Cybersecurity Risk of the Businesses You Work with?’
Tags : 
     FICO
By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
     StrongMail
By: SuccessFactors     Published Date: Aug 29, 2012
With the many ways that exist to reach job applicants, why is finding great candidates so difficult? This complimentary SuccessFactors white paper discusses six ways to connect with high-quality candidates. Download the white paper today.
Tags : successfactors, sap, best practices, recruiting manager, talent powerhouse, candidate search, applicant search, high-quality candidates
     SuccessFactors
By: DocuSign     Published Date: Apr 24, 2018
"The healthcare industry struggles along the entire paper trail from start to finish. The current process is slow, costly, inefficient, full of errors, vulnerable to security breaches and hurts the people they are chartered to care for. Download this complimentary whitepaper and discover how DocuSign’s eSignature solutions modernize healthcare and life sciences organizations by eliminating paper and antiquated signature processes while meeting compliance requirements and reducing costs and errors. You will learn how DocuSign helps the healthcare industry to: • Reduce turnaround times for diagnostic result documents by weeks • Cut excessive administrative expenses and eliminate manual rekeying errors • Increase efficiency by eliminating time spent sending paper forms with doctors’ signatures"
Tags : 
     DocuSign
By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. This rule significantly expands the definition of fiduciary, spanning financial advisors as well as plan sponsors, funds, and producers who provide incentives to advisors. The rule has far-reaching impacts on business, compliance, and operations/technology and the April 2017 compliance deadline is coming up quickly. View this on-demand webinar and learn how DocuSign can help you: • Satisfy the final rule requirements by automating disclosures with a tamper-proof audit trail • Delight clients and brokers by providing a greatly improved customer experience • Meet critical DOL deadlines with rapid implementation "
Tags : 
     DocuSign
By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
     DocuSign
By: IdentityIntact for Business     Published Date: Oct 21, 2011
IdentityIntact for Business presents a comprehensive review of how your business can be better protected from data breach attacks by cyber thieves.
Tags : 
     IdentityIntact for Business
By: Epicor Software Corporation     Published Date: Mar 09, 2018
Learn how ERP software addresses the real-world challenges companies face as they look to grow in today’s global economy. Take the virtual tour and see how your business can: • Reach new markets, expand product lines and grow your business with deep Industry and country specific functionality • Drive improved customer experience and accelerate the digital transformation of your business • Expand collaboration within your company and throughout your supply chain with social and commerce solutions • Respond quickly to changing demands with configurable real-time mobile capabilities Please view the virtual tour below for more information about Epicor ERP version 10. The tour will acquaint you with Epicor ERP and offer insight on how Epicor inspires growth for leading business around the globe.
Tags : 
     Epicor Software Corporation
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : healthcare, cyber security, data security, security
     QTS
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : human resources, cisco, employees, data, analysis
     Cisco EMEA Tier 3 ABM
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: SAP     Published Date: May 18, 2014
From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a true 360-degree perspective on SAP HANA.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics