RecruitingBlogscom

Follow Us:

 

2018

Results 276 - 300 of 470Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: Dec 05, 2018
DDoS attack size doubled in early 2018 after attackers discovered and employed a new, massive DDoS reflection and amplification method with the potential to multiply their attack resources by a factor of 500K. The attack vector, called memcached UDP reflection, uses resources freely exposed on the internet — no malware or botnet required.
Tags : 
    
Akamai Technologies
Published By: BeyondTrust     Published Date: May 02, 2019
An Analysis of Microsoft Security Updates in 2018
Tags : 
    
BeyondTrust
Published By: BeyondTrust     Published Date: Jul 29, 2019
An Analysis of Microsoft Security Updates in 2018
Tags : 
    
BeyondTrust
Published By: AppDynamics     Published Date: Mar 05, 2018
Cloud computing has been gaining momentum for years. Many more enterprises see public cloud as their top priority, up from 29 percent in 2017 to 38 percent in 2018 according to the RightScale “State of the Cloud Report” published in 2018. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration.
Tags : 
    
AppDynamics
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Fiserv     Published Date: Mar 02, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations. In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: • Global payment initiatives • Open Banking standards • Artificial intelligence and machine learning • Consumer demand for real-time fraud prevention and detection
Tags : 
cyber crime, financial crime, financial security, customer experience, financial crime risk management, global payments, open banking standards, artificial intelligence, machine learning, fraud prevention, fraud detection
    
Fiserv
Published By: LogMeIn     Published Date: Feb 27, 2018
The rise of mobile devices have changed the way we communicate, the way we work, and the way we shop. Mobile devices give power to the consumers. Constant connectivity allows for easy access to endless information providing customers with multiple purchase options. In eCommerce, mobile shopping is sharply rising. According to Forrester, 29% of all U.S. eCommerce transactions will occur on a tablet or mobile phone this year, totaling $114 billion. By 2018, that percentage will rise to 54% of the total $414 billion in eCommerce sales.i All of this information points to the fact that mobile is not just a trend, it's a reality. A reality that forces businesses to change the way they engage with their customers.
Tags : 
mobile, applications, reporting, deployment, chat, device
    
LogMeIn
Published By: Adobe     Published Date: May 15, 2018
See your peers' biggest priorities, most important KPIs, and marketing spending for mobile devices and experiences. Between September and October 2017, Adobe surveyed close to 500 marketers and IT professionals to explore current mobile trends and priorities, get a glimpse of where they're going with their mobile efforts, and learn what the most advanced organizations are doing to create the next wave of transformative mobile experiences. Read our findings and see how mature your mobile strategies are in comparison to your peers'.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
See your peers' biggest priorities, most important KPIs, and marketing spending for mobile devices and experiences. Between September and October 2017, Adobe surveyed close to 500 marketers and IT professionals to explore current mobile trends and priorities, get a glimpse of where they're going with their mobile efforts, and learn what the most advanced organizations are doing to create the next wave of transformative mobile experiences. Read our findings and see how mature your mobile strategies are in comparison to your peers'.
Tags : 
    
Adobe
Published By: Lookout     Published Date: Dec 11, 2018
"Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device. "
Tags : 
    
Lookout
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Para lograr la agilidad y generar un impacto real en la transformación comercial, se debe adoptar la modernización del centro de datos como una competencia principal. Es crucial tener la infraestructura de TI más actualizada para ser compatible con la escala y la complejidad de un panorama de tecnología cambiante. Las empresas deben incorporar este imperativo mediante la adopción de los principios del centro de datos definido por software y la modernización, además de la automatización de sus procesos de gestión de TI. Quienes lo hagan, impulsarán la innovación del negocio y ofrecerán experiencias de cliente superiores con una tecnología empresarial rápida, segura y confiable. En diciembre de 2018, Dell Technologies encargó a Forrester Consulting la evaluación del valor comercial de infraestructuras modernas en centros de datos empresariales. Forrester realizó una encuesta en línea a 508 tomadores de decisiones tecnológicas de infraestructura de TI en empresas en siete países para expl
Tags : 
    
Dell EMC Storage
Published By: Oracle     Published Date: Apr 16, 2018
Cerca de 62% dos CFOs entrevistados pela Fuqua School of Business da Duke University afirmam que o ritmo da mudança e da inovação em seus setores acelerou. As empresas precisam estar prontas para mudar seu foco, mas onde os CFOs devem concentrar sua atenção em 2018? Steve Cox, vice-presidente de marketing de produtos de ERP e de EPM do grupo Oracle, fala sobre ações fundamentais orientadas à tecnologia.
Tags : 
voce, precisa, saber, atualizar, otimizar, financeira, maneira
    
Oracle
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: Zebra Technologies     Published Date: May 02, 2018
Today’s shoppers demand technology-enabled experiences that straddle clicks and bricks. They want better prices, more choices, next-day delivery and easy returns. They want a quick, friction-free product search and purchase experience, and they want it right now. How can retail technology help you satisfy them? Our 10th annual Shopper Vision Study surveyed thousands of consumers throughout North America, Latin America, Asia-Pacific, Europe and the Middle East, asking the questions that really matter to find out what shoppers really want—giving you the insight you need to be their preferred retailer, both in-store and online. The New Retail Mandate: Shopper Vision Study reveals exactly what your customers are thinking, what their habits are and how retail technology can help you be more effective. Download the Shopper Study today to learn how today’s smartest retailers use emerging technology to manage inventory, enrich the shopping experience and keep shoppers satisfied.
Tags : 
shopper, study, technology, product
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Aug 14, 2018
Today’s shoppers demand technology-enabled experiences that straddle clicks and bricks. They want better prices, more choices, next-day delivery and easy returns. They want a quick, friction-free product search and purchase experience, and they want it right now. How can retail technology help you satisfy them? Our 10th annual Shopper Vision Study surveyed thousands of consumers throughout North America, Latin America, Asia-Pacific, Europe and the Middle East, asking the questions that really matter to find out what shoppers really want—giving you the insight you need to be their preferred retailer, both in-store and online. The New Retail Mandate: Shopper Vision Study reveals exactly what your customers are thinking, what their habits are and how retail technology can help you be more effective. Download the Shopper Study today to learn how today’s smartest retailers use emerging technology to manage inventory, enrich the shopping experience and keep shoppers satisfied.
Tags : 
shopper, vision, study, technology, customer
    
Zebra Technologies
Published By: Jebbit     Published Date: Jun 12, 2018
How can you strike the right balance? It’s paradoxical...and annoying. Our consumers want personalized, tailored experiences, but they hold their data cards close to the chest. After Cambridge Analytica, data breaches, and creepy advertising practices, the only way forward is to build (and maintain) trust with your audience. Download this new report to learn: How did we get here? With so much data at our fingertips, what went wrong? How do consumers feel about personalization in 2018? How to get ahead and stay ahead. What data to keep, and what to throw out.
Tags : 
privacy, paradox, consumer, data, marketers
    
Jebbit
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q3'19
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: MarkLogic     Published Date: Aug 31, 2017
With MiFID II regulations demanding increased pre and post-trade transparency for consumers, investment banks are in a race against the clock to demonstrate compliance across a dizzying array of data sources, systems and schemas before January 2018.
Tags : 
    
MarkLogic
Published By: Coupa     Published Date: Dec 14, 2018
Many procurement departments are still using traditional manual processes or outdated technology. The result? Rogue spending, missed discounts from supplier contract pricing, reconciliation headaches, and the list goes on. These business risks are driving more organizations towards the cloud-based, secure, and workflow-friendly world of eProcurement solutions. These solutions are saving money and resources, improving use of budgets and personnel, enabling centralization, and using data to improve and streamline end-to-end purchasing processes. Download this report to learn about: Procurement trends from 400 organizations surveyed Operational and cost-savings benefits of eProcurement Leading features and functionality in eProcurement Adoption best practices and how to get started
Tags : 
    
Coupa
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Today’s IT leaders don’t have the time nor the resources to effectively respond to the needs of their ever-demanding workforce. It’s time for CIOs to stop running the IT department and start transforming the business; only through transforming the way in which they deploy and service the workforce can CIOs accomplish this paramount task. Organizations must now embrace a future that improves the workforce experience in order to offload cumbersome and time-intensive tasks. With IT becoming more integrated and a strategic partner to the lines of business (LOBs), offloading and embracing new technologies that enable employee experience is a logical step. In September 2018, Dell commissioned Forrester Consulting to evaluate the effectiveness of PC-as-a-service (PCaaS) and the appetite of organizations to use PCaaS. Forrester conducted five interviews with IT decision makers, with knowledge of desktop infrastructure, or those who had responsibility with PC life cycle services to explore this
Tags : 
    
Dell EMC EMEA
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top