peo

Results 1 - 25 of 928Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: Brainshark     Published Date: Aug 02, 2017
As buyers have become increasingly more savvy and better-educated, B2B sales organizations have changed their strategies. But that can’t happen in a vacuum – sales training must change as well. This brief provides specific ways to improve both the training content delivered to sales reps and the all-important methods for delivering that content. With this actionable information, managers and trainers can begin enacting real change that gets reps more conversation-ready than ever before. Get your copy of this latest brief today. And ready your sales force for better opportunities and more wins.
Tags : 
sales mastery, b2b, b2b sales, salespeople, better selling, sales training
    
Brainshark
Published By: Brainshark     Published Date: Aug 02, 2017
Onboarding – every company does it, but a shockingly few do it really well. In fact, The Sales Management Association found that after sales onboarding is complete, 1/3 of reps still lack proficiency in up to a dozen key selling skills. That’s a LOT of training that goes in one ear and out the other. At best, this leads to slow ramp times for new reps that take far too long to start closing deals. At worst? Your turnover rates skyrocket, forcing you to start all over with a new batch of hires. So the question is – how do you break the cycle and onboard salespeople in a way that actually works? This exclusive eBook provides 6 steps to better sales onboarding
Tags : 
sales, sales onboarding, sales blueprint, sales people
    
Brainshark
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
More and more people are using their personal devices to work from home, but are they secure enough? With the proper preparation, your laptop or smartphone can actually help improve security. Read our white paper for 5 easy tips to work securely on your personal device: Where to store your files to avoid data theft or loss Why those pesky update notifications are too important to ignore How often you should change your passwords, really
Tags : 
data security, personal device, security tips, passwords
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : 
cloud, cloud security, encryption, security, mobility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses similar to yours to get work done from any device, any time. Download this e-Book to find out: What benefits 85% of businesses get from relying on the cloud How business-class cloud services use encryption to protect your data Why 79% of IT pros say it’s people, not technology, that cause security gaps
Tags : 
cloud security, data encryption, data security, mobility, efficiency
    
Citrix ShareFile
Published By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
Published By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : 
ugc, user generated content, revenue, curalate, social media, millenials
    
Curalate
Published By: IBM     Published Date: Jul 06, 2017
In order to exploit the diversity of data available and modernize their data architecture, many organizations explore a Hadoop-based data environment for its flexibility and scalability in managing big data. Download this white paper for an investigation into the impact of Hadoop on the data, people, and performance of today's companies.
Tags : 
hadoop, flexibility, scalability, data architecture
    
IBM
Published By: Concur     Published Date: Aug 15, 2017
As travel and expense (T&E) management solutions have improved, the expectations of the end user are higher than ever before. Business travellers want a seamless experience and you want better visibility, increased compliance, and reduced spend. Our research identified two types of people – Leaders and Followers. Leaders have most of their spending under management, have increased compliance to company policies and approve expense reports more quickly. Followers are lagging behind.
Tags : 
platform, travel, payment, expense management, mobile app, corporate budgets, trip cost visibility, enterprise
    
Concur
Published By: Google Analytics 360 Suite     Published Date: Jul 27, 2017
Most companies have a few people who are testers and optimizers by nature, interest, or experience. But what really moves the dial is when everyone in the company embraces a test-and-learn approach to improving the customer experience across all touchpoints. Why is the test-and-learn approach so effective? When you test everything, your team values data over opinions. Everyone keeps learning — even from failures. The results? More visitors, more sales, happier customers, and a healthier bottom line. To help you get there, this guide provides insights on: What constitutes a culture of growth and optimization Tips for building that culture in your own company Lessons from marketing leaders who embrace the test-and-learn approach
Tags : 
    
Google Analytics 360 Suite
Published By: AmVenture     Published Date: May 23, 2017
For many people, owning their own business is the definition of the American Dream. According to the Small Business Association (SBA), there are over 400,000 new businesses started every year. However, keeping that dream alive can be difficult. Here we give you 10 of the most common reasons why small businesses should fail. If you can heed these warnings, you offer yourself a greater chance of success.
Tags : 
small business, fail, american dream, success
    
AmVenture
Published By: Zugata     Published Date: Aug 11, 2017
This Case Study details how the Jive HR team drove an initiative to transform the existing performance management process into a people-first program, resulting in one that delivers value and drives engagement.
Tags : 
performance management, company culture, learning and development, growth culture, talent management, talent development, total rewards, performance
    
Zugata
Published By: Monotype     Published Date: Jun 29, 2017
After years spent hidden in the shadows of Millennials, Generation Z is taking over the spotlight and making some serious waves in the process. Gen Zs are the first true digital natives, born between the late 1990’s to the mid 2000’s, and only know a world with Internet access, social media and smartphones. This “YouTube generation” is tech-savvy and pragmatic, drives innovation and the way we consume media, and they’re pushing brands and marketers to catch up in the process. Like, follow, read, repeat In an era of massive information (and advertising) overload, the brand-consumer relationship is a delicate dance. One misstep and a disgruntled customer will gladly find a new partner. Thanks to a mobile-first, visually rich, social and digital world, people expect flexibility, authenticity and consistency in every single interaction with a brand. In order to keep your customers engaged and happy, look to the emerging behaviours and preferences of Generation Z as a beacon for what’s to c
Tags : 
generation z, communication, media, marketing, branding, customer engagement, digital engagement
    
Monotype
Published By: Fitbit     Published Date: Jul 26, 2017
There's no doubt that step-based activity challenges can motivate people to move more. In fact, Fitbit data shows that users who participate in Fitbit's in-app Challenges take an average of 2,000 more steps per day than those who do not. But maybe you've run several successful step challenges at your company and you're ready for change. Check out these four non-step-based challenges that can help your employees get their health in check - in ways that go beyond steps.
Tags : 
employee health, employee motivation, fitness, sleep, wearable device, health benefits
    
Fitbit
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your pipeline and shorten your sales cycle.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: LSSiDATA     Published Date: Feb 05, 2010
New movers are ideal targets for Direct Marketers. New homeowners and renters invariably purchase a wide range of products and services. According to moving.com "People who are moving spend more during the 3 months surrounding their move than non-movers spend in 5 years."
Tags : 
lssidata, data, direct marketers, marketing, super consumers, new mover, clv, clec
    
LSSiDATA
Published By: Zynapse     Published Date: Jun 16, 2010
Data Governance has emerged as the point of convergence for people, technology and process in order to manage the crucial data (information) of an enterprise. This is a vital link in the overall ongoing data management process for it maintains the quality of data and makes it available to a wide range of decision making hierarchy across an organization
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: Advertise.com     Published Date: Nov 15, 2010
According to The Fireclick Index, a comprehensive web analytics solution, over 96% of the people who visit a website leave without completing any action, like a purchase.
Tags : 
advertise.com, sales, boost, remarketing, analytics, web analytics, abandonment
    
Advertise.com
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.