RecruitingBlogscom

Follow Us:

 

measures

Results 76 - 100 of 247Sort Results By: Published Date | Title | Company Name
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
"Chrome Browser provides secure, trusted access to data, apps, and cloud services, connecting employees on any device to a new generation of powerful tools for work. With proactive securitymeasures protecting them while they work, users get a consistent, customizable experience whenever and wherever they access it."
Tags : 
    
Google Chrome Enterprise
Published By: LogMeIn     Published Date: Feb 27, 2018
LogMeIn offers consistently reliable service to its Bold360 customers and is vigilant in efforts to provide services that are not only robust and scalable, but also secure. This document describes how we achieve reliable scalability and the measures taken by LogMeIn to protect Bold360 customer data.
Tags : 
industry, network, service, operations, scalability, data, encryption
    
LogMeIn
Published By: K 12 Insight     Published Date: Apr 13, 2018
After Parkland, Safety is on everyone’s mind. While physical safety measures, such as metal detectors and door locks can help, school leaders also have to think about emotional safety. Do students feel safe in your schools? Download this guide, and learn three ways to give students and parents a voice in the school safety discussion.
Tags : 
school safety, k-12, bullying, school leaders, safety policy, threats, communication
    
K 12 Insight
Published By: Google Apigee     Published Date: Feb 05, 2019
In our 26-criterion evaluation of API management solutions providers, we identified the 15 most significant ones — Axway, CA Technologies, Google, IBM, Microsoft, MuleSoft, Oracle, Red Hat, Rogue Wave Software, Sensedia, Software AG, TIBCO Software, Torry Harris Business Solutions, Tyk Technologies, and WSO2 — and researched, analyzed, and scored them. This report shows how each provider measures up and helps application development and delivery (AD&D) professionals make the right choice.
Tags : 
    
Google Apigee
Published By: Magnetrol     Published Date: Nov 05, 2018
Tank overfill is a crucial safety concern in the petroleum industry. Failure to put adequate prevention measures in place has resulted in injuries, loss of life, and billions of dollars worth of damages worldwide. These resources were developed by the level control experts at Magnetrol to help you implement and maintain an effective Overfill Protection Plan for your terminals. Simply click on the downloads below at the Resources section to access this important information.
Tags : 
    
Magnetrol
Published By: List Sotheby's International Realty, Singapore     Published Date: Dec 10, 2018
The cooling measures announced by the government on 5 July threw the residential market into a frenzy. Within a span of five hours, over 1,000 units were sold from three new projects as buyers rushed to beat the midnight deadline to avoid paying the new higher Additional Buyer’s Stamp Duty (ABSD) rates. The 1,000 units came from three projects that were launched that night: over 500 units from Riverfront Residences in Hougang, around 300 units from Park Colonial at Potong Pasir and some 200 units from Stirling Residences in Queenstown. For the rest of the quarter, response to new launches was patchy as potential home buyers weigh affordability with opportunity cost. The residential price index edged up by a mere 0.5% q-o-q, a far cry from rises of 3.4% in Q2 and 3.9% in Q1. This moderate price increase shows that the key objective of the cooling measures, which is to achieve a more gradual but sustainable price growth, has been met. Download the full report to Learn more.
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: CCMI     Published Date: Aug 31, 2012
This report identifies the real challenges mid-market businesses face, measures the true scope of the problem, and examines available alternative solutions.
Tags : 
tem, telecom expense management, expense solutions, vcom, ccmi, communications services, finance
    
CCMI
Published By: Workday Italy     Published Date: Aug 15, 2018
In our 35-criteria evaluation of software-as-a-service (SaaS) HR management systems providers, we identified the eight most significant ones — ADP, Ceridian, Meta4, Oracle, Ramco Systems, SAP SuccessFactors, Ultimate Software, and Workday — and researched, analyzed, and scored them. This report shows how each provider measures up and helps application development and delivery (AD&D) professionals and their HR business stakeholder clients make the right choice.
Tags : 
    
Workday Italy
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management
    
HP - Enterprise
Published By: Intacct Corporation     Published Date: Sep 18, 2014
The professional services market is back—and more competitive than ever. How will you outperform your competitors? By monitoring the financial metrics that matter. Through years of thorough research, Service Performance Insight has analyzed and identified the profit-centric measures that are highly correlated with financial success in professional services. Download the white paper, "The 5 KPIs that Matter for Professional Services," to learn: • The importance and primary characteristics of financial maturity. • The 5 financial metrics critical to service organizations. • Where successful service organizations fall in these metrics.
Tags : 
intacct, kpi, professional services, financial metrics, service performance insight
    
Intacct Corporation
Published By: Intacct Corporation     Published Date: May 07, 2015
Learn how you can quickly and clearly capture, validate, quantify, and report on the appropriate outcome metrics. And learn how the right financial management solution will position your organization for greater efficiency, greater growth, and, ultimately, greater success. Forward-thinking nonprofits are focusing on measuring outcomes. Download this white paper to discover: • What outcome metrics are—and why you need them • The differences between performance vs. outcomes • Which metrics are most important to your organization • How to get started (hint: gently)
Tags : 
reporting, outcome metrics, financial management solution, nonprofit, funders, small business, finance
    
Intacct Corporation
Published By: Allscripts     Published Date: Jun 17, 2014
To prepare for value-based care models, Mercy Health System uses interoperable solutions to attest for Meaningful Use, implement 24 ACO clinical quality measures in three months, and achieve PCMH Level 2 Certification in eight sites. With a healthy EHR core, Mercy is prepared for future growth.
Tags : 
allscripts, ehr core, mercy health system, interoperable solutions, healthcare organization, value-based care models, clinical aco metric reports, pcmh level 2 certification, eileen skinner, information technology, practice management
    
Allscripts
Published By: ForeScout     Published Date: Feb 18, 2014
Know your enemy! Establishing an effective defensive strategy is crucial with today's rapidly evolving cyberthreats. Understanding the cybercriminals' techniques used to perpetrate successful attacks is essential. The Cyberthreat Defense Report is based on a rigorous survey of IT security decision makers and practitioners across North America and Europe. It reveals the current and planned deployment of technological countermeasures. Read this new report from CyberEdge and stay one step ahead of your enemy.
Tags : 
forescout, cyberedge, cyberthreat, it security, security, it management, business technology
    
ForeScout
Published By: Adobe     Published Date: Oct 24, 2018
in our 24-criteria evaluation of experience optimization platform (EoP) providers, we identified the eight most significant ones — Adobe, dynamic Yield, Evergage, Monetate, optimizely, oracle, sAs, and sitespect — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (Ci) professionals make the right choice.
Tags : 
    
Adobe
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: FICO     Published Date: Sep 12, 2017
PSD2 puts accountability for unauthorised or fraudulent payments squarely on payment service providers. PSPs are now obliged to confirm their customer’s identity robustly when making payments and when managing their accounts. But these measures threaten to put barriers in the way of the frictionless journey that customers want.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: Adobe     Published Date: Nov 09, 2017
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones — The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
In our 40-criteria evaluation of enterprise marketing software suites (EMSS) providers, we identified the nine most significant ones — Adobe, Experian Marketing Services, IBM, Marketo, Oracle, Salesforce, SAP, SAS, and Teradata Marketing Applications — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, Evergage, Google, IBM, Localytics, Mixpanel, Optimizely, SAS, and Webtrekk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
In our 32-criteria evaluation of real-time interaction management (RTIM) providers, we identified the 12 most significant ones — Adobe, Emarsys, FICO, IBM, IgnitionOne, Infor, Pegasystems, Pitney Bowes, Rocket Fuel, Salesforce, SAS, and Teradata — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top