line data

Results 1 - 25 of 757Sort Results By: Published Date | Title | Company Name
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston, dallas
    
NetShelter - CyrusOne
Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : 
enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies, it management, storage
    
BLADE Network Technologies
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Ponemon Institute presents the findings of The Insecurity of Privileged Users - outlines the current threats to an organization's sensitive and confidential data created by a lack of control and oversight of privileged users in the workplace.
Tags : 
    
Quinstreet - Infosec
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 5 key insights from year-over-year data with some perspective on the 2011 UK Christmas season. Read on to learn more about key metrics in the season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, 2012 uk christmas, online retail, e-commerce, shopping, search marketing, advertising, online advertising
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 7 key insights from year-over-year data on the 2011 US holiday season. Read on to learn more about key metrics in the holiday season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, search advertising, clicks, impressions, search advertising, marketing metrics
    
Kenshoo
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
    
Avi Networks
Published By: NAVEX Global     Published Date: May 06, 2016
This report outlines Data & Analysis to Help You Benchmark Your Programme Against the World’s Largest Ethics & Compliance Hotline Database—and Enhance Your Ethics & Compliance Programme Effectiveness.
Tags : 
data analysis, benchmarking
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 06, 2016
This annual report is an excellent starting point for organisations committed to benchmarking and improving programme effectiveness.
Tags : 
ethics, ethics and compliance, human resources, database, hotline reporting, navex, large database, benchmark database
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme, including: Does our culture support employees who raise concerns? Are our communications with employees reaching the intended audiences and having the desired effect? Are our investigations thorough and effective? Do we need more training? Do we need to review or update our policies? Do employees know about our reporting channels? Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. This year’s analysis of our EMEA & APAC data from nearly 14,000 ethics and compliance hotline reports revealed key data points that compliance professionals can use to benchmark and assess their programme’s performance, and move toward predictive risk mitigation.
Tags : 
navex, ethics and compliance software, hotline data, risk mitigation, incident management systems
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
Ethics and compliance officers have many opportunities to leverage the data in their hotline and incident management systems to improve their compliance programmes— and their organisational culture of ethics and respect. This year’s benchmarks point to several opportunities to increase programme effectiveness. Hotline data that is carefully tracked, reviewed, benchmarked and presented with sufficient context often provides the early warning signs needed to detect, prevent and resolve problems. We at NAVEX Global hope that this report is helpful to your organisation and we welcome any feedback on these findings.
Tags : 
whistleblowing, hotline, whistleblowing hotline, hotline best practices, hotline benchmark data, whistleblower protection, whistleblowing programe
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
The 2017 EMEA & APAC Whistleblower Hotline Benchmark report was produced with data from companies of all sizes and industries across the region. Use the findings to put your company’s whistleblowing report data in context or gain organisational alignment to start your whistleblower programme. Use this report to answer questions like: • Am I getting too few or too many reports compared to like-sized companies? • Is my organisation following up on cases in an appropriate timeframe? • How can I more effectively follow-up on anonymous reports?
Tags : 
emea, apac, ethics, whistleblowing, incident management, reporting data, case closure, reporting systems, anti-retaliation
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen
    
Unica
Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking
    
Mimecast
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
In this paper, you'll learn more about each of the four Board responsibilities outlined in the U.S. Sentencing Guidelines with respect to ethics and compliance programs.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
When it comes to explaining information, this white paper outlines a few basic data visualization tips to improve the impact of visualizations, ensuring that the story in the data is expressed as effectively as possible.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: Sprinklr     Published Date: Nov 22, 2016
A quick fact sheet that details the reach and audience of major messaging apps to help companies know which platform would be best suited to their audience.
Tags : 
messaging app research, messaging app data, social media data, social media intelligence, snapchat data, snapchat statistics, wechat data, wechat statistics, whatsapp statistics, whatsapp data, line statistics, line data
    
Sprinklr
Published By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : 
advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising, dsp, rtb, ad networks, ad exchanges, iab, banner ads, clickthrough, pixel, pixel tracking, mobile device detection, video advertising, interactive advertising
    
Mirror Image Internet
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.