fte

Results 201 - 225 of 1904Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
Published By: BlackLine     Published Date: Aug 06, 2018
There is no getting away from it – keeping up with compliance and control is a constant challenge. It is something that is mandated on organizations and in the aftermath of many financial crises there is little sympathy for organizations that do not comply with the demands of their industry regulators.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 28, 2019
Validating the completeness and accuracy of sales (and related balance sheet impact) is of paramount importance, but often requires significant manual effort. As revenues grow, organizations are forced to devote additional resources to processes like sales audit and other detailed reconciliations or expose themselves to risk. For the retail industry, having an adequate sales audit process is crucial to the integrity of financial statements. And innovations like new forms of consumer payments and omni-channel models only add to the complexity.
Tags : 
    
BlackLine
Published By: Bloomberg Government     Published Date: Sep 19, 2011
Sign up today to download the latest report on the impact of Dodd-Frank on financial firms.
Tags : 
government, bloomberg, legislative, issues, regulatory, congress, small business
    
Bloomberg Government
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
    
Blue Prism
Published By: Bluecore     Published Date: May 14, 2018
After decades in the limelight, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages. To better understand how retailers are using email, including the extent to which they have embraced individualized messaging opportunities and the effectiveness of those messages, Bluecore turned to the data. Our 2018 Retail Email Benchmark report provides a baseline understanding of these a
Tags : 
    
Bluecore
Published By: Bluecore     Published Date: Oct 23, 2018
AFTER DECADES IN THE LIMELIGHT, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages.
Tags : 
bluecore, retail, email, report, ecommerce, marketing
    
Bluecore
Published By: Bluecore     Published Date: Nov 13, 2018
DON’T LET ONE-TIME BUYERS BECOME ONLY-TIME BUYERS One-time buyers are retail gold: They present an incremental revenue stream and a chance to foster valuable new customer relationships. But while that first purchase is an achievement and the mark of a strong customer acquisition program, what comes after that first purchase is just as important. And for most retailers, it’s what comes after that presents the biggest problem.
Tags : 
retail marketing, marketing roi, customer retention
    
Bluecore
Published By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
Published By: Bluecore     Published Date: May 07, 2019
For retailers, driving second purchases from first-time buyers presents enormous revenue potential in both the short and long term. But getting those second purchases often proves difficult. So what does it take? Data from over 400 retailers reveals why the second purchase is the most important purchase, why it eludes so many retailers and how to use customer data to turn one-time buyers into two-time buyers.
Tags : 
    
Bluecore
Published By: BlueHornet     Published Date: Jun 06, 2008
This 19-page white paper includes before and after examples of rendering issues and fixes across top email programs. It makes specific coding recommendations you can use to improve the look and performance of your emails across every major email program, including Outlook 2007.
Tags : 
email marketing, email messaging, blue hornet, bluehornet, html, outlook, email rendering, rendering
    
BlueHornet
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Published By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
    
BMC ASEAN
Published By: BMC ESM     Published Date: Aug 20, 2009
Can consolidating your data center yield long-term savings sufficient enough to warrant the project? There is no doubt. By right-sizing your data center, you can often recoup the project costs in months, not years.
Tags : 
data center consolidation, consolidation, data center, bmc, cobit, cmdb
    
BMC ESM
Published By: BMC Software     Published Date: Oct 23, 2014
To better support the business, I&O managers often turn to IT service support management (ITSSM) tools. ITSSM tools enable IT operations organizations, specifically infrastructure and operations (I&O) managers, to better support the production environment. ITSSM tools automate the tasks and workflows associated with the management and delivery of quality IT services to the business. The vendors in this Magic Quadrant offer integrated products that address functionality from a combined perspective of people, processes and tooling. BMC was rated as a leader by Gartner in the Magic Quadrant.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration
    
BMC Software
Published By: BMC Software     Published Date: Oct 23, 2014
Gartner clients often ask for a comparison of BMC and ServiceNow as viable strategic partners in the ITSSM tool space. Both vendors provide strong ITSSM offerings and benefit from excellent global brand recognition, but the similarities end there. Outside of ITSSM, BMC and ServiceNow are two different companies with two different strategic road maps. Choosing between BMC and ServiceNow requires IT organizations to determine how value will be gained beyond the use of their ITSSM offerings.
Tags : 
itssm, strategic partners, it organizations, itsm integration, saas
    
BMC Software
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : 
security, security management, access control, identity management, iam, authentication, crusafe, and-group
    
Borer Data Systems Ltd.
Published By: Bounty Jobs     Published Date: Oct 14, 2015
The BountyJobs Direct Hire Agency Benchmarking Reports are released twice a year to provide business leaders with key insights into trends and past performance of the agency recruiting marketplace, where companies seek some of the most highly sought-after candidates.
Tags : 
human resources
    
Bounty Jobs
Published By: Bounty Jobs     Published Date: Oct 14, 2015
In this e-book, you'll learn how to: -Increase hiring velocity for high-demand talent -Create stronger recruiting teams -Find and engage the right agencies The six data points in this e-book are critical to unlocking the full potential of direct hire agencies in order to land those highly sought-after job candidates. Commanding this data will also position your recruiting teams to become strategic advisors to your company and its business units.
Tags : 
direct hire agencies, headhunters, job candidates, recruiting teams, recruitment, human resources
    
Bounty Jobs
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library