pts

Results 1 - 25 of 371Sort Results By: Published Date | Title | Company Name
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: InMoment     Published Date: Oct 16, 2019
InMoment surveyed 1,300 U.S. consumers to understand the state of trust and loyalty, as well as customer perception about retailers’ attempts to offer more experiences versus simple transactions. Download the report to read the insight gathered.
Tags : 
    
InMoment
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Office Depot     Published Date: Dec 01, 2015
Read this free infographic to learn three key concepts of workplace design for creating a comfortable workplace that inspires creativity and productivity.
Tags : 
workplace design, creativity, human resources
    
Office Depot
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile
    
OutSystems
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement
    
Allscripts
Published By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research ist ein herausragendes IT-Forschungs- und Beratungsunternehmen. Mit der Gewichtung auf technologischer Innovation und Marktstörung liefert es wichtige Erkenntnisse für führende Unternehmen der digitalen Wirtschaft. Mehr als 100 Analysten und Berater stellen diese Erkenntnisse durch syndizierte Forschung, Beratungsdienste und Live-Events für über 1.000  undenorganisationen in Nordamerika, Europa und auf der ganzen Welt bereit. 451 Research wurde im Jahr 2000 mit Hauptsitz in New York gegründet und ist ein Geschäftsbereich von The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
Published By: Microsoft Office 365     Published Date: Apr 05, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Apr 14, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy
    
Websense
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
    
Cisco
Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
If your bank is like many, it encrypts only a minimum of data. This is because many banks believe, incorrectly, that encrypting all data is unworkably cost- and resource-intensive on any platform. Encrypting piecemeal creates the need to carefully track where you are encrypting, what you are encrypting, and the time and resource costs of these activities.
Tags : 
    
Group M_IBM Q2'19
Published By: POS Supply     Published Date: Jun 24, 2011
Sales receipts as a marketing tool
Tags : 
receipt marketing, point-of-sale marketing, printed receipts, marketing
    
POS Supply
Published By: IBM     Published Date: Aug 22, 2014
This white paper introduces the key concepts and challenges of IT governance and introduces the reader to the IT governance solution provided by IBM.
Tags : 
risk analytics, business analytics, it governance, futures, finance
    
IBM
Published By: IBM     Published Date: Jan 20, 2015
An introduction to the key concepts and challenges of IT governance and how these can be efficiently approached and mitigated with IBM® OpenPages® IT Governance.
Tags : 
business risk, it governance, it risk management, kpis, it policies
    
IBM
Published By: AppZen     Published Date: Aug 02, 2019
Go beyond just matching invoices, receipts and purchase orders Identify duplicates Check prices and payment terms Enforce discounts Highlight compliance issues Validate contractor activity Discover fraud Confirm fulfillment of goods and services
Tags : 
    
AppZen
Published By: AppZen     Published Date: Oct 21, 2019
Go beyond just matching invoices, receipts and purchase orders Identify duplicates Check prices and payment terms Enforce discounts Highlight compliance issues Validate contractor activity Discover fraud Confirm fulfillment of goods and services
Tags : 
    
AppZen
Published By: Quantum Metric     Published Date: Oct 18, 2019
At Quantum Metric, helping companies improve digital customer experience is our passion. We’ve harnessed the learnings and observations we’ve had across dozens of Fortune 500 organizations to develop a methodology that companies can use to achieve meaningful results quickly - helping leadership and teams highlight the lowest hanging fruit in their organizations. The principles for our guide are: Be Easy to Understand. Five clear steps with specific goals and outcomes. Provide Value from Day One. No month-long assessments required. Deliver Quantifiable Outcomes. Clear, objective, and measurable improvements. Be Consistent. Produce repeatable results. Be Universal. Applicable to a wide-variety of businesses and situations. Using the concepts illustrated within this methodology, digital teams from every industry have been able to consistently deliver stellar customer experiences that encourage and maintain long term brand loyalty.
Tags : 
    
Quantum Metric
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: Emotive Brand     Published Date: Jan 27, 2010
The concepts of "brand" and "reputation" are often seen as one and the same. However, when viewed separately, significant opportunities arise to improve both. The road to successful branding has never been more complex or challenging. What started, as a one-way lane going directly from the manufacturer's door to the buyer's door is now an everexpanding, two-way, multi-lane superhighway with intersections, tollbooths, and rest stops.
Tags : 
emotive brands, reputation, branding, brand
    
Emotive Brand
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library