web

Results 1 - 25 of 3979Sort Results By: Published Date | Title | Company Name
By: Gigaom     Published Date: Jan 31, 2019
In this webinar we will discuss how leading entities are modernizing manufacturing with mobile and IoT.
Tags : samsung, mobile manufacturing, manufacturing, internet of things, iot, ai manufacturing, artificial intelligence, business intelligence, business management, information management, productivity, manufacturing execution systems
     Gigaom
By: Mimecast     Published Date: Jan 16, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
     Mimecast
By: CloudHealth Technologies     Published Date: Jan 16, 2019
Amazon Web Services (AWS) forever changed the world of IT when it entered the market in 2006 offering services for pennies on the dollar. While its prices have come down significantly over the years, many companies learned the hard way that moving to the public cloud didn’t always achieve the cost savings they expected. In fact, organizations have frequently noticed public cloud bills two to three times higher than expectations(1). This doesn’t mean that moving to the public cloud is a mistake. The public cloud provides huge benefits in agility, responsiveness, simplified operation, and improved innovation. The mistake is assuming that migrating to the public cloud without implementing management, governance and automation will lead to cost savings. To combat rising cloud infrastructure costs, use these proven best practices for cost reduction and optimization to make sure you are getting the most out of your environment.
Tags : 
     CloudHealth Technologies
By: Staples Business Advantage     Published Date: Jan 14, 2019
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this webinar, security expert, Ron Chestang of HP, and Michael Mayberry of Staples Business Advantage, discuss the rise of IoT, how to mitigate risk and the hidden costs of securing your network.
Tags : 
     Staples Business Advantage
By: Workday     Published Date: Jan 10, 2019
Today’s shifting economy has industries and occupations in a constant state of flux. To prepare students for this changing workforce, higher education must rethink its purpose and structure. Watch this webinar replay to discover what the future of work looks like and how your institution might need to respond.
Tags : shifting economy, future of work, changing workforce
     Workday
By: Workday     Published Date: Jan 10, 2019
Wellesley College has a lot of success stories to share following its strategic deployment of Workday. Increased internal adoption and collaboration between finance and HR are just the start of a long list of benefits the college now enjoys. Watch the webinar replay with Wellesley’s Ravi Ravishanker, CIO and associate provost; Nephellie Dobie, director of Project Management and Business Analysis; and Veronica Brandstrader, associate CIO, to learn about its: • Evaluation and deployment • Technology transformation • Benefits realized • Lessons learned
Tags : 
     Workday
By: Workday     Published Date: Jan 10, 2019
: Institutions relying on outdated legacy systems are struggling to keep up with new demands. Watch the webinar to learn how moving to Workday can help your institution become more effective and streamlined, get the most out of your employees and technology, and deliver a better, more engaging experience.
Tags : 
     Workday
By: Group M_IBM Q119     Published Date: Jan 10, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
     Group M_IBM Q119
By: Workday     Published Date: Jan 09, 2019
The HR strategy at Zappos may be highly unorthodox, but it’s working. This webinar, sponsored by Workday, explores how Zappos transformed its HR experience by entrusting employees, recruiting talent that understands the company’s culture, and more.
Tags : 
     Workday
By: Workday     Published Date: Jan 09, 2019
In this Argyle Executive Forum webinar, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
     Workday
By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
     Great Bay Software
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
.
Tags : 
     Oracle
By: Here Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : location data, ad tech, location targeting
     Here Technologies
By: Forcepoint     Published Date: Jan 07, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Forrester study demonstrates positive ROI with Forcepoint Web and Email Security Cloud solutions The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period!
Tags : web security, cloud security, email security, web security cloud, email security cloud, digital transformation, branch security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Forcepoint Stratgies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn more!
Tags : network security, distributed offices, web security, branch security, digital transformation, data security, cyber security
     Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.