soc

Results 1 - 25 of 3067Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: AEC Systems Pty Ltd     Published Date: Aug 07, 2008
This report was commissioned by Asta Development, AEC Systems business partner for project management solutions. The study was conducted amongst consultancies from the business/management and human resources sectors. The research was conducted by an independent IQCS (Interviewer Quality Control Scheme) and MRQSA/BS 7911 (Market Research Quality Standards Association) accredited agency on behalf of Asta Development plc.
Tags : time management, productivity, consult, consultant, workforce, aec, aec systems, business intelligence, business management, business process management, enterprise resource planning, workforce management, spend management
     AEC Systems Pty Ltd
By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
     Dell APAC
By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
     Intel
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether its speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institutes 2017 Cost of Data Breach Study says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EUs General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: SES     Published Date: Aug 01, 2019
Descubra cmo una empresa de comunicaciones est llevando conectividad a las zonas ms remotas de Per. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avin, Axesat est entregando soluciones por satlite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cmo, en asociacin con SES Networks, la empresa puede aumentar el comercio y la conectividad en Per.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
Este blog de nuestro vicepresidente de Desarrollo Tecnolgico e Innovacin ofrece la opinin de un experto sobre la revolucin 5G. Descubra el impacto que tendr la arquitectura 5G sobre nuestra futura sociedad hiperconectada. Adems, explore casos de uso que incluyen comunicaciones masivas tipo mquina, comunicaciones mejoradas de banda ancha mvil y baja latencia.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
Este artigo de blog, escrito por nosso VP de Desenvolvimento e Inovao Tecnolgicos, apresenta insights de especialistas sobre a revoluo da rede 5G. Descubra o impacto que a arquitetura da rede 5G ter na nossa sociedade "hiperconectada" do futuro. Conhea casos de uso como comunicaes massivas por mquina, maior largura de banda mvel e comunicaes com baixa latncia.
Tags : 
     SES
By: Riskified     Published Date: Aug 06, 2019
In Economics 101, students learn about the concept of a perfectly competitive market. This is a marketplace with many buyers, multiple sellers, undifferentiated products, and easily accessible information about prices. While this model is supposed to produce optimal outcomes for consumers and society as a whole, the theory dictates that hyper-competition will push sellers margins closer and closer to zero.
Tags : 
     Riskified
By: Asurint     Published Date: Aug 05, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks arent created equal, however. Whether youre seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, its vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, weve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs.
Tags : 
     Asurint
By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platforms innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus build-it-yourself solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con cos tante violazioni di dati in grado di rovinare unintera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi pi rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilit societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. Its perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses its a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
     Infinidat EMEA
By: ttec     Published Date: Jul 24, 2019
Omnichannel is one of those words everyone uses, but few use correctly. Its not another word for multichannel. Its a different state of existence. In our experience, multichannel is the ability to interact with customers across many different channels, but not necessarily in a cohesive fashion. As new channels become available, they are bolted on to existing customer experience infrastructure such as CRM or customer support systems. Too frequently, the management of these channels becomes siloed (web versus in-store sales, for example). The effect of this from the customer experience standpoint can be disjointed and jarring. For example, the resolution of an issue following a customer conversation with an associate in the contact center may not be reflected when the customer goes online or into a store. Yet the ability to offer multichannel service experience is table stakes for todays business. If youre not available in the channels where customers want you to be, you cease to b
Tags : 
     ttec
By: ttec     Published Date: Jul 24, 2019
In an age of tech-savvy customers and self-service channels, do companies still need to invest in contact centers and staff to provide support? The answer is, yes. READ THIS PAPER TO: Examine the strategic role of the contact center to deliver differentiated customer experiences while driving increased revenues and cost savings. Learn essential strategies for promoting associate productivity and satisfaction. Leverage cross-sell and up-sell opportunities that benefit the customer. Share lessons learned from EnergyAustralias experience.
Tags : 
     ttec
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation, network management, network performance management, network security, wide area networks
     Virtela Communications, Inc.
By: Adobe     Published Date: Jun 26, 2019
IDC quantifies the value of Adobe Experience Manager Assets for organizations interviewed at an average of $3.17 million per year per organization over three years, which would result in an average three-year ROI of 366%. Adobe Experience Manager Assets generates this value by: Increasing the return on content investments by improving asset findability and reuse and by reducing redundant content creation efforts Accelerating time to value from marketing and brand campaigns by streamlining asset distribution Improving team productivity through workflow automation Reducing risk associated with the use of outdated or unapproved digital assets
Tags : 
     Adobe
By: Adobe     Published Date: Jun 26, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. Key topics that youll read more about in this years report: Optimising customer experience and delivering personalised experiences in real time. Using data better for smarter audience segmentation and targeting. Be wary of walled gardens. Control and own the data, and always be compliant. Automation is the future. Understand the benefits, learn how to use it.
Tags : 
     Adobe
By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded Ensuring that your organization has a unified view of your assets and the threat environment
Tags : network management, network security, network security appliance, security, security architecture
     Juniper Networks
By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc, service oriented communications, web service management, service management
     NEC
By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring
     CareerBuilder
By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, application integration, analytical applications, configuration management, database development, web service management
     ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.