company

Results 1 - 25 of 2524Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : technology, mapping, location data
     HERE Technologies
By: Gigamon     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
     Gigamon
By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your company’s digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of today’s API-powered digital businesses. What’s inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
     Google Apigee APAC
By: Google Apigee APAC     Published Date: Jun 10, 2019
How Six Companies Innovate with API Management Companies are hungry for ways to innovate in the digital age, and as enterprises have experimented with new technologies, it’s become clear that success requires expanding the reach of digital assets beyond a business’s internal talent. The connected experiences that customers demand occur across a range of channels, and the people building those experiences can be a developer building a mobile app in her garage just as easily as an IT engineer. Businesses need to make their digital assets leverageable to more developers so they can build more digital experiences across more channels, scalably and securely, to engage more customers. In this brief, we explore the diverse ways that innovation leaders have leveraged APIs to transform the way their companies do business. Download this brief to learn more about how to use the power of APIs to open new business channels for your company.
Tags : 
     Google Apigee APAC
By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. That’s an indisputable fact. There are some places though, where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur – a mere relic – maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
     CheckMarx
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : email marketing, triggered emails, audience segmentation, email capture
     Bluecore
By: AppZen     Published Date: Jun 18, 2019
Learn how Mortenson Construction used AppZen's AI-based Expense Audit to cost effectively review 3000+ expense reports in seconds, while flagging misconduct and recouping T&E spend for the company.
Tags : 
     AppZen
By: AppZen     Published Date: Jun 17, 2019
Setting clear expectations and guidelines around travel and entertainment expenses (T&E) is crucial to establishing a healthy company culture. Employees want to feel at ease laying out money for the company, feeling confident they will get reimbursed quickly. Crafting a comprehensive T&E policy and making sure it’s available to all employees is an important first step, but a policy alone isn’t enough — a culture of anxiety and mistrust can emerge from even the most carefully constructed policies.
Tags : 
     AppZen
By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the company’s bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that don’t fit an recognized pattern.
Tags : 
     AppZen
By: S & C Electric Company     Published Date: Jan 26, 2015
As discussion around development of a smart grid has steadily increased, so too has talk about smart microgrids. A critical ingredient for smart microgrids is energy storage. Energy storage can play a major role in facilitating use of renewable energy resources to power microgrids, while also protecting power stability and reliability within the microgrid. Energy storage technology has advanced significantly in recent years, and the latest technology holds many promising benefits for microgrid applications. In fact, these new energy storage technologies require a complete rethinking of what microgrids are capable of doing. This paper will review the impact of energy storage on smart microgrids, and will also look at a few real-world applications of energy storage within a microgrid.
Tags : 
     S & C Electric Company
By: MuleSoft     Published Date: Apr 15, 2019
eCommerce offers consumers new ways to interact with traditional retailers, resulting in changed consumer preferences – 63% of customers today would switch brands for a better connected experience, and 75% want personalized offers based on purchase history. Traditional retailers need to consider how to build a new digital retail platform strategy within their business models to engage with consumers and help maintain their competitive edge. Read this whitepaper to learn: A 4-step strategy for retailers to build a retail digital platform strategy with APIs. The role APIs can play in optimizing consumer journey personalization and creating new revenue channels. How a leading fast food company created a unified consumer experience by adopting a platform-based business model.
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Apr 23, 2019
In today’s competitive landscape, businesses need to make decisions quickly in order to respond to rapidly changing customer preferences and nimble competitors; whether it’s a new business strategy, a new business process, or a new market offering, businesses are competing on speed and agility. The overwhelming majority of today’s business and IT leaders understand digital transformation is necessary to maintain leverage amid constantly changing customer preferences. They also have a clear picture of their desired end state—exemplified by leaders like Amazon, Google, and Microsoft. However, only a small minority of have a clear understanding of the path they need to lead the market. In this paper you’ll learn: How to build digital transformation into the root of your company with a practical, natural, and tested blueprint. Best practices from over 1,600 enterprises to transform your strategy, organization, and technology from the ground up. Actionable next steps to start your journ
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Apr 23, 2019
Digital transformation is front and center and this year, it’s all about connecting the customer experience. MuleSoft surveyed 650 IT leaders from global enterprises. The research shows that the vast majority (97%) of companies are currently undertaking or planning to undertake digital transformation initiatives. Nine out of 10 IT leaders believe if they don’t complete those initiatives, their companies will lose revenue. How does your company stack up? Download the 2019 Connectivity benchmark report to find out: The top digital trends of 2019. The evolving role of IT as a business catalyst. Which strategies leading enterprises are adopting to get ahead.
Tags : 
     MuleSoft
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : application modernization, forrester consulting, apo, asg, application portfolio optimization
     ASG Software Solutions
By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : extensis, direct wine, portfolio server, images, dam, solutions
     Extensis
By: Decca Consulting LLC     Published Date: Sep 14, 2012
Most Companies Have an Issue with Talent Acquisition and Retention. This can be overcome by working with the right Staffing Company who will understand your need and work at a reasonable cost tailored to fit your budget.
Tags : 
     Decca Consulting LLC
By: UMEED SOFTWARE SOLUTIONS PVT LTD     Published Date: Feb 18, 2013
OUR ORGANIZATION IS A PRIVATE LIMITED COMPANY AND EXTREMELY SOUND IN SOLAR PV APPOINTMENT SETTING/SURVEY,EVERY INFORMATION GETS CAPTURED VERY CAREFULLY SO THAT THOSE ARE QUALIFY-PRO AND REAL TIME CONVERTIBLE.
Tags : 
     UMEED SOFTWARE SOLUTIONS PVT LTD
By: Site Pro PPC     Published Date: May 14, 2009
Often times hiring a professional to manage your PPC accounts actually saves you money. Check out our free whitepaper to find out why!
Tags : site pro, ppc, ppc management, adwords, google, yahoo, msn
     Site Pro PPC
By: Mcorp Consulting     Published Date: Feb 17, 2010
See how the landscape of customer experience is being altered forever, as touchpoints continue to drive shifts in distribution, feedback and marketing channel control. In this whitepaper, you'll learn how making your touchpoints stronger, faster and smarter today will mean increased profits and stronger market positions tomorrow. (Plus 7 specific steps any company can take to improve customer experience today.)
Tags : mcorp, customer experience, relationship lifecycle, loyalty, retention, bottom line, touchpoint marketing, touchpoint mapping, touchpoint management, touchpoint agency, customer experience strategy, customer journey mapping, touchpoint management, customer experience measurement, customer mapping, customer satisfaction measurement, crm
     Mcorp Consulting
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com