corporate

Results 1 - 25 of 1089Sort Results By: Published Date | Title | Company Name
Published By: SiteImprove     Published Date: Sep 13, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We liked that Umbrella’s intelligent proxy would give us granular protection without the performance impact of a traditional web proxy.” - Torben Olsen, Corporate Information Security Manager, Lundbeck
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
"The state of chatbots has quickly evolved from a fad to an essential part of corporate strategy. No longer a nascent technology, chatbots have matured into solutions that enterprises across industries are taking seriously. But how do we distinguish a simple chatbot from human-like, AI- driven conversational solutions that we now see businesses adopting? In this three part series, we will examine what it means to deploy “Conversational A.I.” for the enterprise"
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: ConnectWise     Published Date: Aug 22, 2019
The goal of automation is not to eliminate or replace human labor, but to increase productivity and quality beyond what is possible with your existing team, so as to realize economies of scale and predictable quality levels. With automation, your team is able to manage more endpoints, because automation eliminates routine and mundane responsibilities or efforts, giving your technicians the time to focus on higher priority and more complex tasks. In addition, as a managed service provider (MSP), you receive a fixed fee for your services. As a result, you need to provide service in the most efficient way possible while delivering the highest levels of consistency and quality. Building automation into your IT services business will enable you to do so. In this eBook, you’ll learn tips and best practices to successfully incorporate automation into your IT services business, including:
Tags : 
    
ConnectWise
Published By: MicroStrategy     Published Date: Aug 28, 2019
Data and analytics are the key accelerants of digitalization, transformation and “ContinuousNext” efforts. As a result, data and analytics leaders will be counted upon to affect corporate strategy and value, change management, business ethics, and execution performance.
Tags : 
    
MicroStrategy
Published By: Ahead     Published Date: Aug 27, 2019
Digital Business Demands Better Software, Faster In your organization, you’ve probably heard questions like these asked of the application development and/or infrastructure and operations organizations. > Why can’t our software development teams keep up with new business requirements? > Why are we always waiting on infrastructure teams? > Why do our business initiatives become outdated before their required software is even deployed? > Is our software development team aligned with corporate goals like engaging younger consumers on their mobile devices?
Tags : 
    
Ahead
Published By: Outreach.io     Published Date: Sep 17, 2019
LinkedIn is the largest social networking platform for business professionals, but utilizing it effectively to build your brand and move the needle for you business is a delicate balance. Many leaders struggle with finding the right balance of building an authentic brand. To help you begin building your brand, establish your voice, and drive business and opportunity for yourself and your team, this guide will answer the following questions about effectively using LinkedIn: Does building my brand help me close deals? How can the platform move the needle for my pipeline? What is proper etiquette when communicating with peers? How do I enable my sales team to incorporate LinkedIn into the outbound efforts? Download today to establish your presence on LinkedIn!
Tags : 
    
Outreach.io
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Sift     Published Date: Aug 29, 2019
As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach
Tags : 
    
Sift
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Aug 08, 2008
Business runs on content and that content must be managed holistically, across the entire business. However, managing content is, in itself, not enough to drive business. Enterprises must incorporate ECM with other IT management systems to provide complete Business Service Management (BSM).
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
    
ASG Software Solutions
Published By: Marketo     Published Date: Sep 03, 2019
Your website is the hub of interaction between your company and your customers, and in an increasingly competitive digital landscape, today's buyers aren't simply looking for a one-size-fits-all customer experience. Web personalization empowers you to provide more relevant experiences to online visitors and speak to them with personalized messages at scale. It enables you to communicate across all marketing channels with a consistent voice and user experience that builds trust, engagement, revenue, and loyalty. In this ebook, discover how to: Integrate web personalization into your marketing strategy Incorporate cross-channel marketing in your web personalization strategy Create content to maximize the impact of personalization Leverage AI and machine learning to provide personalized web content Measure impact and success Choose the right web personalization tool for you Build a website that accelerates engagement, conversion, and retention by downloading the Introductory Guide to
Tags : 
    
Marketo
Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it
    
123Together
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
AppAssure Software
Published By: Karya Technologies     Published Date: Nov 25, 2011
Access corporate desktop data at ease, even during commute. Remote access to desktop documents anytime, anywhere. Mobilize your enterprise file server
Tags : 
    
Karya Technologies
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Ability Commerce     Published Date: May 18, 2009
Reggie Brady shares some of her favorite e-mails and explain why they're tops in her book. As you read them, think about how you might incorporate these tactics in your own e-mail programs.
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management
    
Ability Commerce
Published By: SAP     Published Date: Feb 03, 2017
In the digital economy, data is becoming more interconnected every day. The volume of highly-connected data is growing rapidly, while also becoming a highly-valued corporate asset. By exploring relationships among people, processes and things, new business opportunities emerge, helping grow your business's competitive advantage.
Tags : 
    
SAP
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.