cast

Results 326 - 350 of 1245Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Jun 15, 2017
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security, cyber attacks
    
Mimecast
Published By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
    
Entrust Datacard
Published By: FICO     Published Date: Jun 06, 2017
As a subsidiary of the world’s largest food company, Nestlé USA is laser-focused on doing more with fewer resources and adopting highly efficient technologies and processes, including machine learning and prescriptive analytics. With 64 brands consisting of numerous products in each brand, maximizing payload and minimizing transportation costs is an extremely complex problem – particularly when you factor in demand forecasts and current supply levels.
Tags : 
manufacturing, manufacturing optimization, manufacturing solutions
    
FICO
Published By: Mitto     Published Date: Jun 06, 2017
APQC reports that 30% of CFOs that are unhappy with their current planning solution.1 Most FP&A professionals want a planning and forecast process that is fast and repeatable. They want the financial data to be accurate and transparent to the deepest levels. They need planning tools that provide structure to streamline the process and flexibility to accommodate changes in the business. And they require analysis and reporting that bring visibility to the state of the business and lead to actionable insights. This paper details five best practices that Finance teams can follow to improve their planning and forecasting and influence the strategy of an organization.
Tags : 
veritas, backup, recovery, netbackup
    
Mitto
Published By: SAS     Published Date: Jun 05, 2017
Forecasts are never as accurate as you need them to be, and lots of forecasting consultants and software vendors are willing to take your money in exchange for unfulfilled promises. This white paper explores why forecasts are often wrong and some ways to improve them.
Tags : 
    
SAS
Published By: Host Analytics     Published Date: Jun 05, 2017
EXPERT GUIDE TO CREATING A ROLLING FORECAST FRAMEWORK Ten Best Practices For Streamlining Your Planning Processes Gaining a crystal ball look into your company’s future starts by creating a rolling forecast framework built on driver and project-based planning. Download this guide to discover the actionable steps to: -Identifying the dynamics of revenue and the related drivers. -Generating your financial objectives for rolling forecasts. -Replacing Excel with the functionality to accommodate your budget and strategic management. Learn how to transform your planning processes with the full benefits of rolling forecasts in this white paper.
Tags : 
    
Host Analytics
Published By: Host Analytics     Published Date: Jun 05, 2017
Most FP&A professionals want five things from a planning and forecast process: -speed -accuracy -repeatability -flexibility -actionable insight But according to an AQPC report, 30% of Senior Finance professionals are unhappy with their current planning solution. To ensure that you influence the strategy of your organization, download this white paper for five tips on how to improve your planning and forecasting process.
Tags : 
    
Host Analytics
Published By: IBM     Published Date: May 16, 2017
When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
IBM
Published By: Dell EMC     Published Date: May 10, 2017
Join experts from IDC and Dell EMC to discover how converged and hyper-converged infrastructure is paving the path to the future—enabling IT leaders to do more with less in today’s quickly changing, fast-paced world. Watch the free webcast from Dell and Intel® today.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: Teradata     Published Date: May 02, 2017
even West Media (SWM) is Australia’s leading multiple platform media company with a market-leading presence in broadcast television, magazine and newspaper publishing, and online. To support its unprecedented broadcast of the Rio de Janeiro 2016 Olympic Games, SWM integrated the world’s first production implementation of the Teradata Database running on Amazon Web Services (AWS) into its existing data ecosystem. This enabled the delivery of critical insights during the event and helped directly drive audience engagement with SWM’s digital products, resulting in the creation of a powerful audience asset that that now informs their broadcasting, marketing, and advertising plans. Find out how with in this case study.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Teradata
Published By: IBM     Published Date: Apr 27, 2017
It’s hard to grow your business if you can’t see what’s coming next. What will the demand be for a specific product or service and how should you adjust production? What revenue can be expected and from which channels? Where are the best areas to expand your business? Predictive analytics can provide the answers executives, analysts and business managers need to reduce costs, operate more efficiently and increase the bottom line. Join IBM SPSS and guest Mark Lack, Manager of Strategy Analytics and Business Intelligence with industrial products company Mueller Inc. for a look at how to decrease costs and improve your business’ profitability with predictive analytics. You’ll learn how Mueller extends the value of its Big Data environment by applying predictive techniques to accurately forecast sales, prevent fraud and reduce losses from damaged inventory, saving the company significant time and money.
Tags : 
predictive analytics, fraud detection, increase revenue, decrease costs, customer retention, hr efficiency, advanced analytics
    
IBM
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
gdpr, security, regulation, forrester
    
Mimecast
Published By: IBM     Published Date: Apr 21, 2017
"When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing. Speakers include Liz Miller, Senior Vice President of Marketing for the CMO Council; Jody Sarno, Dedicated Client Partner, Communications Industry for IBM; Chris Crayner, Ch
Tags : 
ibm, senior marketing decision makers, audience targeting, digital experiences, branding
    
IBM
Published By: Mimecast     Published Date: Apr 18, 2017
"Your organization can’t survive without email. In turn, the data held within email is an invaluable resource for compliance, e-discovery and workflow efficiency purposes. And moving to the cloud involves its own set of challenges around preserving that content. It’s time to rethink archiving. Download our E-book, 5 Essentials for Cloud Archiving Success, to learn: - How to avoid common misconceptions about cloud email archiving - Ways to enable employee efficiency and productivity through archiving - Why every organization must be prepared for e-discovery and litigation "
Tags : 
cloud, cloud archiving, email archiving, litigation
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : 
email security, email fraud, whaling, mimecast, loss prevention
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack."
Tags : 
ransomware, cyber security, mimecast, fraud protection
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"With over 112 billion emails sent and received on a daily basis, email continues to be the dominant form of business communication. Organizations must formulate a strategy for not just storing email but meeting compliance requirements, responding to litigation requests and providing instant access to these important conservations. While this has traditionally been accomplished with on-premises technology, the cloud has transformed archiving by delivering new capabilities at lower costs. Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
email archiving, cloud, cloud based infrastructure, cyber security, cloud security
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture. When considering a move to Office 365, organizations must be aware of several significant risks to their email infrastructure. The cloud may seem like a simple, cost-effective alternative to on-premises email, but continuity and security issues cannot be overlooked. Download the E-book to learn more about how to avoid cloud email headaches."
Tags : 
office 365, email security, cloud, cloud security, email infrastructure
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your organization is already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : 
mimecast, office 365. email communication, email security, client communication
    
Mimecast
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library