individual

Results 1 - 25 of 428Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Workday Spain     Published Date: Sep 20, 2018
En un nuevo estudio global, CIO.com y Workday realizaron una encuesta destinada a conocer mejor la migración fluida de las organizaciones a cloud. Las conclusiones, basadas en los resultados de la encuesta distribuida a 450 ejecutivos de TI y en 10 entrevistas individuales en 17 países, se han publicado en un nuevo informe. Lea este informe para obtener una nueva perspectiva global sobre las diferencias entre Europa y otras regiones en temas como los siguientes: • Los motivos de las organizaciones para trasladarse a cloud • El proceso de toma de decisiones y las partes implicadas • Mejores prácticas de implementación y lecciones aprendidas en el proceso • Beneficios de la migración a cloud
Tags : 
    
Workday Spain
Published By: Monetate     Published Date: Oct 11, 2018
Monetate Intelligent Recommendations is the only solution that gives merchandisers & digital marketers the power to show contextually relevant product recommendations without burdening IT resources. Using manually curated or algorithmically-driven recommendations, marketers can easily support even the most complex product catalogs. Our solution filters recommendations based on customer attributes (e.g. shirt size), longitudinal behaviours (e.g. browsing behaviour), and situational context (e.g. product inventory at local stores). Best of all, an orchestration layer intelligently selects which algorithms and which filters to apply in any given situation, for any particular individual.
Tags : 
    
Monetate
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Intouch Insight     Published Date: Jul 23, 2018
Customer experience (CX) is a top priority for most retailers, but many struggle to pinpoint where the brand vision for CX is not being delivered - especially at the individual store level.
Tags : 
    
Intouch Insight
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: SAP     Published Date: Mar 02, 2017
Deploying a performance management system is a powerful catalyst for increasing employee and organizational performance. If not handled properly, however, organizations risk creating unnecessary administrative work which can diminish some of the benefits. A key challenge is to balance the tension between creating a fair and consistent evaluation process across the organization and measuring employee performance based on individual needs. What best practices should you follow to help strike the right balance? How have other leading organizations designed effective review forms and processes?
Tags : 
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Zoom     Published Date: May 15, 2015
This is a case study about a proactive approach to protect mobile devices and networks for individuals, businesses and governments.
Tags : 
    
Zoom
Published By: Cisco     Published Date: Feb 12, 2016
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
ebooks, cisco, productivity, digigal, collaboration tools
    
Cisco
Published By: Cherwell Software     Published Date: Apr 07, 2016
Highlights for Children, Inc. was founded in 1946 with the belief “that children are the world’s most important people.” Since its inception, the organization has been dedicated to helping children “become their best selves and become confident, caring, curious, and creative individuals.” Today, the Highlights for Children, Inc., family of companies includes educational publishers who publish textbooks and offer educational seminars for teachers, as well as a consumer division that publishes books, digital products, and four magazines for children ages 0-12. The flagship magazine is Highlights for Children, well known for its Fun with a Purpose.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: SAS     Published Date: Jan 17, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape.
Tags : 
    
SAS
Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions, expectations, profile, experiences, individual, brand advocates, interactions, technology, search marketing, email marketing, emerging marketing, social media, advertising agencies
    
Oracle
Published By: Salesforce     Published Date: Jan 08, 2016
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want. In fact, according to the Salesforce Connected Investor report, 55% of investors want to work more closely with their advisors. To succeed, advisors must have relationships with their clients that are deeper than just the numbers, and focus on individuals and their unique needs.
Tags : 
cloud, financial, salesforce, investors
    
Salesforce
Published By: AON     Published Date: Dec 07, 2017
While the Affordable Care Act (ACA) increased the number of Americans with access to health insurance, U.S. employers and employees continue to struggle with rising health care costs and changing workforce demands. Recent Aon research shows that 20% of health care consumers cite high health care costs as the major reason they have either declined health care coverage, stopped taking medications, or avoided care altogether. If the U.S. health care system is to succeed, stakeholders across the health ecosystem must influence change in each market—employer, individual, and government (Medicare, Medicaid, and Tricare). While each part of the three-legged stool is important, this paper focuses on five strategies Aon believes will strengthen the employer-based system—a system that provides health care coverage to well over half of Americans (61%, or 177 million).
Tags : 
health insurance, employer – provided health benefits, aon hewitt, health ecosystem, well – being initiatives
    
AON
Published By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
    
Cisco Spark
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: FICO     Published Date: May 11, 2017
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : 
customer experience, credit, credit policies
    
FICO
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: