Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

concerns

Results 1 - 25 of 287Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Aug 17, 2018
Leading drivers and challenges that SAP customers tend to contemplate as they consider, plan, and implement a move to SAP S/4HANA. And learn how firms can address the key concerns and provide insight on strategies for managing the change that comes with a new ERP.
Tags : 
    
SAP
Published By: NAVEX Global     Published Date: Apr 20, 2018
An effective third-party risk management programme is in the interest of all organisations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third-party risk management programme and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organisations are facing with their third-party risk management programmes How organisations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase programme effectiveness in your own organisation
Tags : 
    
NAVEX Global
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
    
Nuance Communications
Published By: CrowdTwist     Published Date: Jul 25, 2018
Over the last decade customer-brand relationships have become more and more digitized. Companies have enjoyed access to new technologies, new capabilities, and greater access to customer data. In turn, consumers have become better informed and able to connect with brands with greater flexibility and convenience. However, concerns around mismanagement of customer data, the proliferation of fake news, high profile retailer database breaches, and the Cambridge Analytica scandal has contributed to an erosion of trust between consumers and brands and demands for data privacy. What can brands do to overcome consumer skepticism? What keeps a customer coming back in 2018? And what can brands do to demonstrate relevancy and provide value?
Tags : 
customer, branding, relationships, consumer, database
    
CrowdTwist
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Jan 12, 2016
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Dell EMC     Published Date: May 23, 2017
Digital information has quickly become the lifeblood of business success, enabling firms to become more operationally efficient and to better serve their customers. As companies seek to harness their data in new ways, the infrastructure that houses that data can falter under the strain. In response, new innovations have emerged to help address the concerns of managing and protecting these increasingly important data capacities. While some vendors focus innovation development on software alone and allow the hardware to remain commodity, Dell Technologies is delivering some impressive hardware innovation with Isilon’s next generation hardware to complement its software’s disruptive capabilities.
Tags : 
    
Dell EMC
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
As business becomes more global and teams can often be dispersed across cities or continents, businesses have begun adapting telecommuting as an added corporate culture benefit and as a way to recruit and retain key talent. As a result, managers may find themselves forced to respond to an all-new set of needs and concerns from their staffs. How does the international team leader ensure that the necessary lines of communication stay up when there are thousands of miles and half a dozen time zones separating offices?
Tags : 
communication, performance, accountability, video conferencing, network management, business intelligence, productivity
    
LifeSize, a division of Logitech
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health, insurance, benefits, litigation, qualified guidance, payroll, legal, procedure
    
TriNet
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : 
data breach, credential stuffing, system security, security
    
F5 Networks Inc
Published By: Windstream     Published Date: Oct 22, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterprise’s data—and none of them doing a particularly good job of addressing mission-critical data recoverability requirements. It’s a situation that introduces risk and raises concerns about IT’s ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexity—while ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
    
Oracle
Published By: Digital Realty     Published Date: Feb 25, 2015
Having local expertise on each side of the water helped to address the customer’s concerns and data center requirements at each level of its decision making process. How do you go about finding the right provider for your business?
Tags : 
data center, digital realty, it management, business intelligence, database development
    
Digital Realty
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search