dp and

Results 226 - 250 of 574Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Oct 11, 2018
With the GDPR going into effect this May, many HR organizations must change how they manage and protect employee data. Yet only 7 percent of companies surveyed feel prepared for the change. Do you have a plan to stay ahead of the new legislation? Read this special report to gain insight into how to prepare for the changes mandated by GDPR and how your organization can turn compliance into an opportunity for HR.
Tags : 
    
Workday
Published By: Symantec     Published Date: Oct 19, 2012
Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools - which ones are currently best-of-class?
Tags : 
endpoint protection, symantec, data security, proactive tools, security analysis
    
Symantec
Published By: Symantec     Published Date: Oct 19, 2012
Symantec Endpoint Protection 12.1 solution was compared to two implementations each from McAfee and Trend Micro. Testing encompassed various scanning and system update functions over virtual machines. Read on to figure out which performed best.
Tags : 
symantec, virtualization, virtual desktop, virtual machines, resources, performance, symantec endpoint protection, vmware
    
Symantec
Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
Published By: Polycom     Published Date: Jul 30, 2014
In this MarketScope report, Gartner evaluated seven group video conferencing vendors on business model, customer experience, market responsiveness and track record, marketing execution, product strategy, and overall viability. They conclude that the introduction of personal and mobile endpoints is dramatically reshaping the landscape for group video collaboration, and that IT leaders should align their video portfolios for maximum utilization and strategic fit with their related investments in collaboration and unified communications.
Tags : 
marketscope, group video, system, business model, customer experience, marketing execution, market responsiveness, viability
    
Polycom
Published By: ADP     Published Date: May 31, 2017
When it comes to the ways we work and the dynamics of the workplace setting, one thing is certain — the times are changing. As discovered in ADP Research Institute’s® (ADP RI) 2016 Evolution of Work, changes are already affecting the way we work. In this white paper, we consider how HR is handling these changes.
Tags : 
    
ADP
Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
Published By: Hortonworks     Published Date: Apr 05, 2016
Download this whitepaper to learn how Hortonworks Data Platform (HDP), built on Apache Hadoop, offers the ability to capture all structured and emerging types of data, keep it longer, and apply traditional and new analytic engines to drive business value, all in an economically feasible fashion. In particular, organizations are breathing new life into enterprise data warehouse (EDW)-centric data architectures by integrating HDP to take advantage of its capabilities and economics.
Tags : 
    
Hortonworks
Published By: Oracle     Published Date: Feb 21, 2018
A basic chatbot isn’t that hard to build. In JavaScript, write a public REST endpoint to connect a Facebook page to some chat logic (botly is a popular option) and deploy the whole thing to run on a cloud platform. Zoom out to the bigger picture, though, and you see that Facebook is just one channel. If you use Skype, Slack, Kik, and digital voice assistants, you’ll have to build six or eight of these endpoints straight away. And chatbots are being asked to handle ever more complex responses, so you better build on a platform of machine learning and natural language processing to keep up. That’s why the question enterprise developers should be asking is not “Which chatbot service do I start with?” but “Which platform will let me crank out a chatbot today and also support multiple channels and integrate with back-end systems as these chatbots take off?”
Tags : 
    
Oracle
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Service Now     Published Date: Jan 26, 2018
Digital transformation (DX) has progressed well beyond the abundant hype predicting it to where it is now an existential concern for many enterprises. We are at an inflection point as digital transformation efforts shift from "project" or "initiative" status to strategic business imperatives. Growing enterprises, regardless of age or industry, are striving to become "digital native" in the way their executives and employees think, what they produce, and how they operate. IDC predicts that by 2021, at least 50% of global GDP will be digitized, with growth in every industry driven by digitally enhanced offerings, operations, and relationships, and that by 2020, investors will use platform/ecosystem, data value, and customer engagement metrics as valuation factors for all enterprises.
Tags : 
    
Service Now
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Cyber-crime is forecast to cost the global economy $6 trillion by 2021, up from $3 trillion in 2016. Described by some as the “greatest threat to every company in the world”, public concern for the safety of data is growing – not just in how criminals might use stolen data to commit fraud, but also in how personal data is used by the organizations we engage with.
Tags : 
data, cyber crime, company, personal, management, gdpr
    
AstuteIT_ABM_EMEA
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: TIBCO Software     Published Date: May 16, 2019
Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
data, applications, analytics, algorithms, innovation, cloud, technology, customer
    
TIBCO Software
Published By: Webroot UK     Published Date: Feb 04, 2013
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh.
Tags : 
webroot, security, software, endpoint devices, networks, it staff
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot Secure Anywhere Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint, security, virtualization, environments, performance, protection, manageability
    
Webroot UK
Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
McAfee
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation
    
Selligent Marketing Cloud
Published By: LogMeIn EMEA     Published Date: Jul 19, 2012
Today's mobile workforce can help drive efficiency and boost the bottom line for your organization. However, it is essential that the helpdesk have the right tools to support a widespread employee base. This paper explores the challenges of supporting a remote workforce with legacy tools such as RDPT, pcAnywhereT, VPNs and VNCT and identifies best practices that organizations can use to choose helpdesk tools that better support today's workforce while also cutting costs.
Tags : 
help desk, technology, customer service, rdp, vpn, vnc, best practices
    
LogMeIn EMEA
Published By: Mimecast     Published Date: Apr 18, 2017
"Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance."
Tags : 
forrester, gdpr, organizational processes, security, compliance
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: Workday Italy     Published Date: Aug 15, 2018
In our 35-criteria evaluation of software-as-a-service (SaaS) HR management systems providers, we identified the eight most significant ones — ADP, Ceridian, Meta4, Oracle, Ramco Systems, SAP SuccessFactors, Ultimate Software, and Workday — and researched, analyzed, and scored them. This report shows how each provider measures up and helps application development and delivery (AD&D) professionals and their HR business stakeholder clients make the right choice.
Tags : 
    
Workday Italy
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library