ack

Results 126 - 150 of 6611Sort Results By: Published Date | Title | Company Name
Published By: NAVEX Global     Published Date: Dec 22, 2017
Ethics and compliance officers have many opportunities to leverage the data in their hotline and incident management systems to improve their compliance programmes— and their organisational culture of ethics and respect. This year’s benchmarks point to several opportunities to increase programme effectiveness. Hotline data that is carefully tracked, reviewed, benchmarked and presented with sufficient context often provides the early warning signs needed to detect, prevent and resolve problems. We at NAVEX Global hope that this report is helpful to your organisation and we welcome any feedback on these findings.
Tags : 
whistleblowing, hotline, whistleblowing hotline, hotline best practices, hotline benchmark data, whistleblower protection, whistleblowing programe
    
NAVEX Global
Published By: LogRhythm     Published Date: Jun 19, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
siem, gartner, magic, quadrant, analytics
    
LogRhythm
Published By: iShares by BlackRock     Published Date: May 21, 2018
Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal.Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal. The iShares Funds are distributed by BlackRock Investments, LLC (together with its affiliates, “BlackRock”).This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 503791
Tags : 
business technology
    
iShares by BlackRock
Published By: Marketo     Published Date: Feb 07, 2017
Marketers are making leaps and bounds in their marketing maturity—from how they think about strategy to how they execute campaigns—and they are using technology to make it possible. This report, based on the responses from over 1,300 marketers, covers how marketers are practicing marketing today and highlights a few opportunities for them to act upon. Download the report to get the full results of our survey, including how marketers: Structure their global automation strategy Plan their MarTech stack strategy Use and scale their marketing channels Measure their impact
Tags : 
martech, marketing, global automation, marketing benchmark
    
Marketo
Published By: Jobvite     Published Date: May 15, 2017
In 2016, we published the first-ever recruiting funnel benchmark report, with key metrics for the recruiting industry. The inaugural report was met with great feedback and calls for more data. This year, we’re going even bigger.
Tags : 
    
Jobvite
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: UBM Technology     Published Date: Sep 05, 2017
IT leaders need a full stack of skills to survive and thrive in today's technologically driven world, and striking a balance between cost control and innovation is crucial.
Tags : 
    
UBM Technology
Published By: Interop ITX     Published Date: Oct 20, 2017
IT leaders need a full stack of skills to survive and thrive in today's technologically driven world, and striking a balance between cost control and innovation is crucial.
Tags : 
    
Interop ITX
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Engagio     Published Date: Jun 28, 2018
ooking for an Account Based Marketing solution? Read The Forrester New Wave™: ABM Platforms, Q2 2018 2018 Forrester Wave Report to learn why Engagio was named a strong performer. Customers praised Engagio’s ability to orchestrate marketing and sales motions as well as the breadth and depth of its analytics and assessment capabilities. Read to discover: - The 14 ABM providers that matter the most and how they stack up - How to select the right technology partner for your ABM needs - The Forrester ABM platform evaluation criteria used - Why Engagio was named a Strong Performer
Tags : 
    
Engagio
Published By: InReality     Published Date: Feb 11, 2019
Whether they start in-store, on-the-go, or from their couches at home, today’s shoppers travel complex buying journeys, crossing multiple channels and devices— all while expecting retailers and brands to understand them and meet their growing expectations. This new study reveals what motivates in-store shoppers to make a purchase and keep them coming back again and again.
Tags : 
    
InReality
Published By: Adecco     Published Date: Oct 05, 2017
To hire and retain top talent in today’s ultra competitive job market, you need accurate salary data. As the economy recovers and the unemployment rate declines, job seekers can be more selective—which often means waiting for the right salary. Although benefits, career paths, cultural fit, vacation time and work-life balance still matter, salary remains the most important factor to job seekers. In fact, two thirds of the respondents in Workforce 2020, an Oxford Economics and SAP SE study, said compensation matters most. Our Salary Guide helps you have more informed salary discussions and put together competitive compensation packages—the key to hiring and retaining the best talent.
Tags : 
    
Adecco
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Workday DACH     Published Date: Jul 05, 2019
"Die Studie „2019 Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises“ erleichtert Ihnen die ERP-Anbieterbewertung um ein Vielfaches. Workday wurde von Gartner in puncto Umsetzungsfähigkeit („ability to execute“) und Vollständigkeit der Vision („completeness of vision“) das dritte Jahr in Folge als „Leader“ ausgezeichnet. In dieser Studie erfahren Sie, warum Ihnen die Wahl des richtigen Cloud-Partners für Ihre Kern-Finanzprozesse dabei hilft, die größten Herausforderungen der heutigen Zeit anzupacken."
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday DACH     Published Date: Jul 05, 2019
Die Studie „2019 Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises“ erleichtert Ihnen die ERP-Anbieterbewertung um ein Vielfaches. Workday wurde von Gartner in puncto Umsetzungsfähigkeit („ability to execute“) und Vollständigkeit der Vision („completeness of vision“) das dritte Jahr in Folge als „Leader“ ausgezeichnet. In dieser Studie erfahren Sie, warum Ihnen die Wahl des richtigen Cloud-Partners für Ihre Kern-Finanzprozesse dabei hilft, die größten Herausforderungen der heutigen Zeit anzupacken.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: StrongMail     Published Date: Mar 15, 2010
Email marketing is continually evolving with the introduction of new technologies, regulations and consumer behavior. As an email marketer, you're charged with keeping track of these changes and making the appropriate adjustments to maximize the ROI of your email programs.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
    
StrongMail
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.