usc

Results 76 - 100 of 104Sort Results By: Published Date | Title | Company Name
Published By: Workday France     Published Date: Apr 30, 2018
La révolution numérique bouscule nos modes de vie, nos açons de travailler, nos modes de communication. Dans ce contexte de digitalisation, le CXP et Workday ont souhaité réaliser un état des lieux concernant les systčmes de paie et leur utilisation. Cette étude* identifie les priorités des entreprises, leurs attentes et le niveau de satisfaction vis-ŕ-vis de leurs solutions de paie ainsi que l’exploitation des données qui en est faite.
Tags : 
    
Workday France
Published By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password
    
Okta
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync optimiert nicht nur die Kostenstruktur für die Unternehmenstelefonie, sondern schafft auch ein völlig neues Benutzererlebnis, fördert den Austausch und stärkt die Zusammenarbeit im Unternehmen. Um die Vorteile von Lync umfassend ausschöpfen zu können, muss die zugrunde liegende Infrastruktur optimal genutzt werden. Da die Zahl an Laptops, Smartphones und Tablets langfristig die Zahl der Desktops übertreffen wird, benötigen Unternehmen sichere und zuverlässige Wireless-Infrastrukturen. Mit nur geringem Aufwand können Sie die Qualität und die Zuverlässigkeit multimedialer Kommunikation in Ihrem WiFi-Netzwerk verbessern. Wir haben die Top-10-Tipps für Sie, wie Sie von den Vorteilen von Lync auf mobilen Endgeräten in Ihrem Netzwerk profitieren können…
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.Diese Transformation verstärkt auch den Wettbewerb. In den Worten des Analysten Mark Raskino: „Daher revidierten alle Akteure ihre Strategien ungefähr gleichzeitig, und allen wurde die Macht der digitalen Wirtschaft etwa zur gleichen Zeit bewusst. Konkurrenz ist also unvermeidlich.“
Tags : 
    
CA Technologies EMEA
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware č al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacitŕ che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciň che č necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: Workday France     Published Date: Aug 03, 2018
La révolution numérique bouscule nos modes de vie, nos façons de travailler, nos modes de communication. Dans ce contexte de digitalisation, le CXP et Workday ont souhaité réaliser un état des lieux concernant les systčmes de paie et leur utilisation. Cette étude* identifie les priorités des entreprises, leurs attentes et le niveau de satisfaction vis-ŕ-vis de leurs solutions de paie ainsi que l’exploitation des données qui en est faite.
Tags : 
    
Workday France
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuevo modelo de seguridad que merece la pena entender y emular. Tradicionalmente, en materia de seguridad empresarial, se ha confiado en una estrategia tipo fuerte que blindaba los terminales de los usuarios y creaba muros en torno a la red. En la actualidad, esta estrategia no puede posibilitar ni proteger el uso de dispositivos móviles y funciones de SaaS, que se encuentran al otro lado del fuerte. En consecuencia, los directores de seguridad de la información (CISO, por sus siglas en inglés) se han dedicado a buscar nuevas soluciones capaces de proteger estas tecnologías actuales, así como de adaptarse a medida que cambian las necesidades empresariales y las amenazas.
Tags : 
    
CA Technologies EMEA
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl
    
Entrust Datacard
Published By: Cisco     Published Date: May 15, 2015
Au cours de l'ete 2012, Forrester Consulting a commence a travaillar sur un projet de recherche commande par NetApp consistant a etudier le ROI que les enterprises sont susceptibles d'enregistrer en adoptant la plateforme FlexPod.
Tags : 
data center, software, networking, roi, cisco, platform, enterprise
    
Cisco
Published By: AWS     Published Date: Sep 23, 2019
Tanto si pertenece a un hospital público como a una compańía farmacéutica internacional, Amazon Web Services (AWS) le ayuda a agilizar procesos, mejorar la colaboración y seguridad, crear un entorno de experimentación e impulsar la innovación tecnológica. Las organizaciones del sector de la asistencia sanitaria y de las ciencias biológicas recurren a AWS para todo lo relacionado con el almacenamiento básico y los sistemas de información clínica. Y vamos más allá. Nuestro objetivo es respaldar y capacitar a los expertos para que dispongan de todo lo necesario para poder salvar vidas. Buscamos el compromiso mutuo en cada parte del proceso. Cuando es la vida lo que está en juego, solo nos conformamos con lo mejor. Descubra el futuro de la asistencia sanitaria con la nube de AWS.
Tags : 
    
AWS
Published By: Staples     Published Date: Jun 23, 2017
Every year, musculoskeletal disorders (MSDs) cost workplaces billions. See how attention to ergonomics can change that.
Tags : 
ergonomic, msd, improving productivity, musculoskeletal disorders
    
Staples
Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security
    
BitSight Technologies
Published By: Vendor Guru     Published Date: Jan 04, 2008
Today, companies can prosper from a wide range of computer telephony integration (CTI) solutions. CTI is the full integration of voice and data systems. The convergence of computer systems with call center operations adds increased scalability and muscle to existing business operations.
Tags : 
contact center, call center, call center management, call center improvements, call center productivity, productivity, vendor guru, vendor guru telephony, vendorguru, vendorguru telephony, quinstreet
    
Vendor Guru
Published By: TRUSTe     Published Date: Jun 17, 2010
SureSource is a leading provider of direct-to-consumer ecommerce for major brands. As the owners and operators of leading ecommerce online stores, including BudShop.com, the official online store for Anheuser- Busch, SureSource is the premier partner in optimizing the online customer user experience for their partners.
Tags : 
truste, suresource, ecommerce, budshop, a/b, optimization, user experience
    
TRUSTe
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Published By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
    
Microsoft Office 365
Published By: Thawte     Published Date: Oct 05, 2015
Es ist an der Zeit, sich für durchgängige Website-Sicherheit zu entscheiden. Da Online-Angriffe immer häufiger und einfacher werden, sind Unternehmen in aller Welt zunehmend auf dem Prüfstand und müssen zeigen, dass alle Online-Transaktionen mit vertraulichen Daten sicher sind. Unternehmen, die den Schutz ihrer Kunden und ihrer Marke ernst nehmen, implementieren Always-On SSL, um die Suche, den Meinungsaustausch und das Einkaufen im Internet sicherer zu machen. Mit Always-On SSL sind alle Kundeninteraktionen vom ersten bis zum letzten Klick geschützt. Informieren Sie sich ausführlich über diesen Schutz in unserem Leitfaden.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : 
application screening, user feedback, mobile app development, cloud-based services
    
IBM
Published By: Symantec     Published Date: Nov 30, 2015
Nell’anno appena trascorso si č assisto a una serie di attacchi riusciti contro alcune autoritŕ di certificazione (CA) e il livello di allarme non sembra destinato a diminuire. Gli hacker diventano sempre piů ingegnosi e le tecniche utilizzate per violare le reti sempre piů sofisticate
Tags : 
    
Symantec
Published By: SchemaLogic     Published Date: Jun 11, 2008
Chevron and its subsidiaries use Microsoft SharePoint 2007 to share and exchange information. Yet, it was still a challenge for offices in one part of the world to use materials created by an office in another part of the world. And, the amount of information, shared electronically, was growing exponentially. As a result, the company faced a bit of chaos and a productivity hurdle that begged for more muscle.
Tags : 
chevron, schemalogic, oil, gas, collaboration, sharepoint, share point
    
SchemaLogic
Published By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : 
market engineering, ddos attacks, it security
    
Arbor
Published By: Cisco     Published Date: Jul 19, 2013
Betting on the cloud Jeff Brooks, CIO of Muscogee (Creek) Nation Casinos, is using the cloud to unify operations and create new business opportunities.
Tags : 
cisco, cloud, cloud computing, proprietary data, unify operations
    
Cisco
Published By: NAVEX Global     Published Date: Jan 11, 2018
NAVEX Global recommande l’utilisation d'un logiciel (tel que le logiciel de gestion des incidents EthicsPoint™) pour bénéficier d'une approche cohérente de recueil de données et d’outils applicables ŕ l’ensemble de l’entreprise pour gérer plusieurs programmes de signalement. Les utilisateurs sont ainsi en mesure d’identifier facilement les tendances concrčtes, d’atténuer les risques et de gérer un programme efficace de gestion des incidents oů qu’ils se trouvent, tout en restant ouverts aux audits et informés des évolutions constantes de leur environnement professionnel. Un systčme solide de gestion des incidents n’est pas seulement essentiel pour susciter l’implication des employés et développer un climat de confiance au sein d'une entreprise, c’est également une composante cruciale de protection des employés, de la réputation et de la santé financičre de l’entreprise.
Tags : 
planification, mise en ceuvre, evaluation, ressources, supplementaires, navex
    
NAVEX Global
Published By: SAP     Published Date: Nov 06, 2015
Este informe, basado en una encuesta realizada a más de 200 organizaciones, pone de manifiesto que los usuarios de la nube están buscando una nueva generación de soluciones en la nube que sean simples, altamente colaborativas y que permitan trabajar con procesos de planificación y análisis financieros (FP&A) de alto desempeńo que ofrezcan más precisión y eficacia.
Tags : 
    
SAP
Published By: VMware AirWatch     Published Date: May 24, 2016
Mobilität bietet das Potenzial größerer Wettbewerbsvorteile und damit erstklassige strategische Chancen für Unternehmen jeder Art, sei es durch Möglichkeiten für produktiveres Arbeiten für die Mitarbeiter oder durch innovative Methoden der Kommunikation mit den Kunden. Um dieses Potenzial auszuschöpfen, werden mobile Systeme im Unternehmen benötigt, die von den Benutzern nahtlos auf mehreren Geräten genutzt werden können und einen sicheren Arbeitsbereich für geschäftskritische Anwendungen bieten. Um den Anforderungen des mobilen Personals und Kundenstamms zu genügen, müssen Unternehmen BYOD- und Selbstbedienungsfunktionen sicher auf einer etablierten Plattform bereitstellen, die zudem skalierbar ist, um neue Prozesse zu unterstützen.
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Start   Previous    1 2 3 4 5    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.