infographic

Results 301 - 325 of 459Sort Results By: Published Date | Title | Company Name
Published By: Cornerstone OnDemand     Published Date: May 15, 2015
This infographic shows how to guarantee employees reach their potential through applying a talent management strategy.
Tags : 
employee potential, talent management strategy, employee engagement, human resources, hiring, employee retention
    
Cornerstone OnDemand
Published By: Bazaarvoice     Published Date: May 21, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : 
bazaarvoice, mobile, mobile consumers, mobile shoppers, web content
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management
    
Bazaarvoice
Published By: Cornerstone OnDemand     Published Date: Jul 15, 2015
In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk.
Tags : 
employee engagement, perks, flexibility, work environment, professional experience, talent retention
    
Cornerstone OnDemand
Published By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : 
malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: McAfee     Published Date: Nov 12, 2014
This infographic outlines the results of the McAfee Phishing Quiz.
Tags : 
mcafee email phishing quiz, email phishing, spear phishing, security
    
McAfee
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: HP Enterprise Services     Published Date: Mar 25, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security
    
HP Enterprise Services
Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business, network security, hacker detection, intrusion prevention
    
F5 Networks
Published By: HP AppPulse Mobile     Published Date: Jun 05, 2015
HP has developed a fast, easy method to measure and monitor the user experience in a truly meaningful way: from the user’s perspective. It’s called “FunDex,” a single score from 0 to 100 that encapsulates the average overall user experience. This paper will show you how to measure and monitor your FunDex.
Tags : 
user experience, customer satisfaction, mobile, infographic
    
HP AppPulse Mobile
Published By: WePow     Published Date: Sep 02, 2015
Online video use has grown by huge numbers over the past few years and isn't showing any signs of slowing down. Beyond personal lives, the impact it is having on the way we do business and more specifically talent management can't be argued. Check out WePow's latest infographic on video trends in 2015.
Tags : 
video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips, video trends, video interviewing, infographic
    
WePow
Published By: VMware AirWatch     Published Date: Dec 08, 2016
"VMware is changing how you think about desktop transformation with a brand new approach that uses cloud-based management, intelligent orchestration, and hyper-converged infrastructure to deliver and manage desktops and apps. VMware Horizon® Air™ Hybrid-mode unifies on-premises and cloud-based virtual workspace services into a single, cost-eff­ective platform that's faster to install, easier to deploy, and eff­ortless to scale. Download this infographic to learn more.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Feb 21, 2017
VMware is changing how you think about desktop transformation with a brand new approach that uses cloud-based management, intelligent orchestration, and hyper-converged infrastructure to deliver and manage desktops and apps. VMware Horizon® Air™ Hybrid-mode unifies on-premises and cloud-based virtual workspace services into a single, cost-eff­ective platform that's faster to install, easier to deploy, and eff­ortless to scale. Download this infographic to learn more.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: Demand Frontier     Published Date: Mar 03, 2016
Infographic showing the top 10 facts and figures regarding marketing and sales technologies.
Tags : 
marketing, business development, sales, business practices
    
Demand Frontier
Published By: LifeLock     Published Date: Feb 24, 2017
What you need to know to help protect employees.
Tags : 
    
LifeLock
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.