concern

Results 1 - 25 of 574Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: SambaSaftey     Published Date: Mar 15, 2019
What you don't know could hurt your bottom line Let’s begin with a question: Do you know who is behind the wheel? The reality is that for many enterprises with employees who drive as part of their job, the answer is, “I think so,” or maybe, “no.” Driver risk management has recently become a top issue for many organizations since it directly affects budgets and the bottom line. The fact that there are more than 100 million people driving for work-related activities on U.S. roads and many of them have invalid, suspended or no driver’s license at all should be cause enough for concern. But combining this with the facts that: • most organizations’ budgets are at best flat • P&C insurance rates are rising 14% every 2 years • 90% of crashes are due to human error • there are fewer qualified drivers available today • the number of lawsuits around negligence are skyrocketing • and it becomes clear that understanding exposure to driver risk is imperative for every organization. So what do
Tags : 
    
SambaSaftey
Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Workday France     Published Date: May 17, 2019
Nous savons que les ETI ont des ressources limitées. C'est pourquoi nous avons rédigé un guide pour vous aider à prioriser vos initiatives concernant l'élaboration de votre stratégie Core RH et son application à un système pour en assurer l'évolutivité. Lire la suite.
Tags : 
    
Workday France
Published By: Forcepoint     Published Date: Jun 06, 2019
With the rise of Office 365, IT departments are under pressure to adapt their security posture to protect the new ecosystem. But with a range of security concerns standing in the way of full adoption, teams are rushing to supplement Microsoft's out-of-the-box security with more robust third-party solutions. Download our whitepaper to find out which Office 365 security concerns are keeping your IT peers up at night – and how they're overcoming them to enable greater collaboration and agility across their businesses.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
With the rise of Office 365, IT departments are under pressure to adapt their security posture to protect the new ecosystem. But with a range of security concerns standing in the way of full adoption, teams are rushing to supplement Microsoft's out-of-the-box security with more robust third-party solutions. Download our whitepaper to find out which Office 365 security concerns are keeping your IT peers up at night – and how they're overcoming them to enable greater collaboration and agility across their businesses.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a “Top Player” for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a “Top Player” in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, ”Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection.” They also cited that, “Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoint’s solution is leading edge.”
Tags : 
    
Forcepoint
Published By: Citrix Systems     Published Date: Jun 04, 2019
Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: Increase IT efficiency Reduce security risks Free IT staff to focus on more strategic initiatives
Tags : 
    
Citrix Systems
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound
    
Nuance Communications
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Jan 12, 2016
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: SAP     Published Date: Aug 14, 2018
Today, ERP is a cornerstone of many organisations’ tech infrastructure. Yet many of the solutions in play are legacy products, decades old and designed for an entirely different business landscape. With industry leaders expressing concern that out-of-date ERP solutions have now become an impediment to competitive business, IDC set out to uncover what exactly modern companies need from their ERP systems, and why SAP S/4Hana seems so well placed to deliver.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: Dell EMC     Published Date: May 23, 2017
Digital information has quickly become the lifeblood of business success, enabling firms to become more operationally efficient and to better serve their customers. As companies seek to harness their data in new ways, the infrastructure that houses that data can falter under the strain. In response, new innovations have emerged to help address the concerns of managing and protecting these increasingly important data capacities. While some vendors focus innovation development on software alone and allow the hardware to remain commodity, Dell Technologies is delivering some impressive hardware innovation with Isilon’s next generation hardware to complement its software’s disruptive capabilities.
Tags : 
    
Dell EMC
Published By: Coupa     Published Date: Dec 14, 2018
What P2P Leaders Do That You Can, Too Purchase-to-pay (P2P) organizations are under high-stakes stress. With constant changes in market volatility, fierce competition, and disruptive technology, P2P teams need to re-think their approach to balancing traditional cost concerns and emphasize agility. The question is: how? To help companies discover the answer, The Hackett Group looked at P2P organizations across a variety of industries and areas over a 12-month period to identify what top performers had in common—and what set them apart. Read this report to gain insight into three key areas: Ensuring stakeholder needs guide day-to-day decisions Digitizing information to increase availability and agility Automating processes to accelerate response to change
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management
    
LifeSize, a division of Logitech
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
As business becomes more global and teams can often be dispersed across cities or continents, businesses have begun adapting telecommuting as an added corporate culture benefit and as a way to recruit and retain key talent. As a result, managers may find themselves forced to respond to an all-new set of needs and concerns from their staffs. How does the international team leader ensure that the necessary lines of communication stay up when there are thousands of miles and half a dozen time zones separating offices?
Tags : 
communication, performance, accountability, video conferencing
    
LifeSize, a division of Logitech
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.