soc

Results 401 - 425 of 2968Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Feb 03, 2017
Econsultancy’s 2017 Digital Trends report, published in association with Adobe, is based on a global survey of more than 14,000 digital marketing and ecommerce professionals across EMEA, North American and Asia Pacific markets.
Tags : 
digital trends, customer experience, business transformation, customer experience management
    
Adobe
Published By: Bahrain EDB     Published Date: Nov 23, 2016
This KPMG report looks at the typical costs associated with setting up and operating a manufacturing business in Bahrain, compared to the costs in other Gulf Cooperation Council (GCC) countries. It covers company format>on; land rental and construction; utilities; manpower; visas and labor; and ports and commerce.
Tags : 
gulf, gcc, bahrain, saudi arabia, uae, manufacturing, logistics, fmcg, food, industrial services, aluminium, steel, trading, construction, cost, business, comparison, fdi, investment, abroad
    
Bahrain EDB
Published By: Workday     Published Date: Feb 04, 2019
Human capital management technology plays a key role in helping organizations navigate the rise of the social enterprise, providing the ability to manage the full worker lifecycle, from recruitment to retention, and delivering the analytics needed to drive key business decisions. Read about the four steps businesses should take now.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le piège tendu par un imposteur est plus facile qu'il n'y paraît. Imaginez le scénario suivant : vous travaillez pour une importante société qui a récemment procédé à plusieurs acquisitions. Votre travail consiste à régler les factures. Un matin, vous recevez un message de votre PDG actuellement en déplacement. Il vous demande de virer des fonds afin de pouvoir entamer les négociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu'à la conclusion de l'accord.
Tags : 
directeur opérationnel, directeur financier, ressources humaines, service financier, gestion des salaires
    
Proofpoint
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Mainframe     Published Date: Sep 12, 2008
This White Paper discusses end-to-end application performance management in the context of the impact to the business. It then highlights CA’s application quality and performance manage­ment solutions for both Web and mainframe applications, with particular focus on the integration of CA Wily with AQM Solutions’ TRILOGexpert APCTM for TriTuneTM with Performance Desktop.  It concludes with the Enterprise Management Associates (EMA) perspective on the market in general, and on the CA solution in particular.
Tags : 
ca mainframe, application performace management, quality management, application quality, mainframe
    
CA Mainframe
Published By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
    
iCims
Published By: Brightcove     Published Date: Feb 04, 2015
Welcome to Content Marketing in Australia 2015: Benchmarks, Budgets, and Trends. This is the third year that Content Marketing Institute and the Association for Datadriven Marketing and Advertising (ADMA) have partnered to produce this report. This year, we look at how Australian for-profit marketers (both business-to-business and business-to-consumer) approach content marketing as compared with last year. Download the whitepaper to learn more!
Tags : 
australia, marketing, brightcove, benchmarks, budgets, trends, datadriven marketing and advertising, adma, for-profit marketers, content marketing institute
    
Brightcove
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Success Factors     Published Date: Feb 16, 2012
Do your leaders have what it takes to generate improved performance and execution from their employees. Get your report now, compliments of SuccessFactors, and ensure that your business has the leadership capital it needs.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
Attracting the best talent is a never-ending challenge. Learn five strategies for getting ahead, even in the worst business environments. Get your report now, compliments of SuccessFactors.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
With today's shortage of critical talent, strategic workforce planning is one of HR's most important responsibilities. Discover the common pitfalls that trap many companies-and how to avoid them. Get your compliments report from SuccessFactors now.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
These days, a company success depends on whether it hired the right people to effectively execute its strategies. Download this paper, compliments of SuccessFactors, and learn the critical questions you should ask before interviewing talent.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Success Factors     Published Date: Aug 22, 2012
This white paper discusses six ways to connect with high-quality candidates-from using high-quality descriptions to managing recruiting on the go, using social tools, forecasting your needs, partnering with learning managers, boosting your brand, and more. Learn how to use these approaches in your candidate search. Download your white paper today.
Tags : 
successfactors, sap, best practices, recruiting manager, talent powerhouse, candidate search, applicant search, high-quality candidate, recruiting process, top talent, talent acquisition, recruitment management, talent management, business intelligence, business technology
    
Success Factors
Published By: Force.com     Published Date: Apr 11, 2012
As a result of IT departments struggling to adapt to new economic realities and a rapidly changing technology environment, a new applications layer is being developed - the social employee application layer. Find out more now!
Tags : 
    
Force.com
Published By: Force.com     Published Date: Sep 05, 2012
Aligning the Core Back Office with the Social Front Office in Today's Connected World
Tags : 
best connected businesses, back office salesforce, technology, computing, business technology
    
Force.com
Published By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : 
contact center, customer service, social media, mobile, sip, technology solution, technology, enterprise applications, business technology
    
Genesys
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept