trust

Results 1 - 25 of 987Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
     Entrust Datacard
By: BeyondTrust     Published Date: Jul 29, 2019
What It is & Why Now Is The Time To Implement It
Tags : 
     BeyondTrust
By: BeyondTrust     Published Date: Jul 29, 2019
An Analysis of Microsoft Security Updates in 2018
Tags : 
     BeyondTrust
By: BeyondTrust     Published Date: Jul 29, 2019
Greater visibility and improved integration are vital to tackling the modern threat landscape
Tags : 
     BeyondTrust
By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : engage; reviews, review management, reputation management, uberall, online reviews
     Uberall
By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : analyst, artificial intelligence, intelligent automation, rpa
     Automation Anywhere APAC
By: InMoment     Published Date: Aug 08, 2019
InMoment surveyed 1,300 U.S. consumers to understand the state of trust and loyalty, as well as customer perception about retailers’ attemps to offer more experiences versus simple transactions.
Tags : 
     InMoment
By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
     TIBCO Software
By: Infinidat EMEA     Published Date: May 14, 2019
Infrastructure efficiency and effectiveness directly support profit and growth as competition increases in the cloud and managed service provider (xSP) market. Savvy service providers understand that storage choices have a profound impact on not only their profit and growth, but also on their customer experience and retention. They also know that storage challenges in all those areas increase exponentially with scale. Infinidat storage platforms allow service providers to build and scale differentiated, profitable solutions without worrying about storage. Infinidat technology enables unprecedented efficiency, performance, and resiliency, while flexible business models make it easy for service providers to operationalize those platform advantages—including unique co-branding and promotional opportunities as part of the Powered by Infinidat program. Cloud providers worldwide trust their businesses to Infinidat storage. This paper explores a path for service providers to unlock greater sc
Tags : 
     Infinidat EMEA
By: Oracle     Published Date: Jun 04, 2019
Data is central to marketing function, yet research shows that 50% of CMOs struggle to manage data volumes, or gain insights. Read how to address data ethics and management in your organisation. Marketing’s top priority is to enforce technologies enabling real time data insights to drive instant, personalised CX. Meanwhile, only 30% of CMOs say they have data visualisation dashboards to analyse specific sets of data. Read the findings
Tags : 
     Oracle
By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking
     Sangoma
By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
     Iovation
By: Workday     Published Date: Jul 30, 2019
Before you can best serve your constituents, you must find a way to manage your internal inefficiencies and build a workforce fit for today’s challenges. Read the eBook to learn how your organization can recruit and retain millennial talent, create strategic plans based on trusted data, and break down silos to build up innovation.
Tags : 
     Workday
By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
     Great Bay Software
By: Entrust Datacard     Published Date: Jul 09, 2019
Revised Payment Services Directive (PSD2) is the European Commission (EC) and the European Banking Authority’s (EBA) newest regulatory directive to ensure customer security in the payments space, is upon us. In order to comply with these new regulations, you first need to ensure you have a good understanding of what they are, why they exist and how they will affect your organization’s business strategy moving forward. Don’t let the potential business impact of PSD2 hang over your head. PSD2 can actually be a catalyst for your digital= transformation. With the right solution, you can provide a more secure, better user experience for your customers. If you are able to capitalize on PSD2 and implement a forward-thinking strategy, you can ultimately differentiate your brand from emerging competition — like neobanks, fintechs and wallet providers — and retain customer trust and loyalty.
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 12, 2019
In this whitepaper you will find frequently asked questions regarding the qualified website authentication certificate.
Tags : 
     Entrust Datacard
By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
     VMware
By: Achievers     Published Date: Aug 16, 2019
Understanding HR and Engagement Leaders’ Challenges and Opportunities How can organizations understand the gaps in employee expectations, anticipate the most pressing issues, and adopt the processes and technology that make it scalable? Achievers surveyed HR and engagement leaders’ on the front lines of engagement who understand the challenges and opportunities facing the workplace today. In this report, discover how you can address: • The most pressing engagement challenges for organizations today • The role of employee empowerment and trust in engagement success. • Technology and culture changes that can ensure success
Tags : 
     Achievers
By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc
     NEC
By: ExpertVoice     Published Date: Jun 17, 2019
“Americans have lost faith in institutions.”
Tags : 
     ExpertVoice
By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
     Evatronix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com