"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

boardroom

Results 1 - 25 of 30Sort Results By: Published Date | Title | Company Name
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: mavisliew     Published Date: Feb 18, 2015
In this whitepaper, you’ll find some practical advice on how you can demonstrate your value to the C-suite and gain that all-important seat at the boardroom table.
Tags : 
    
mavisliew
Published By: SuccessFactors     Published Date: Sep 19, 2014
This white paper focuses on communicating metrics to the board of directors.
Tags : 
workforce data, views on workforce management data, effective workforce management metrics, workforce management software, employee performance management, technology
    
SuccessFactors
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
The purpose of this article is to provide the reader with several key insights that can better prepare your organization for mitigating security breaches
Tags : 
    
Concerto Cloud Services
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Success Factors     Published Date: Jul 08, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: Diligent     Published Date: Aug 05, 2016
This whitepaper reveals some of the most commonly asked questions about board portals and how they can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portals, boardroom, sharing information, information management, content management system, document management, intranets
    
Diligent
Published By: SAP     Published Date: Jul 18, 2016
The SAP® BusinessObjects™ Cloud solution offers all analytics capabilities for all users in one product. In the boardroom, at the office, or in front of a customer, you can discover, analyze, plan, predict, and collaborate in one integrated experience designed expressly for the cloud. Read the solution in detail to learn how to turn instant insight into quick action.
Tags : 
    
SAP
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, it management
    
Palo Alto Networks
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: Cisco Systems     Published Date: Jun 05, 2013
Innovative Uses of Telepresence
Tags : 
telepresence, transformative technology, in-person, innovative, boardroom, collaboration, networking, it management, knowledge management, data management
    
Cisco Systems
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security
    
LockLizard
Published By: Destination Analytics     Published Date: Apr 06, 2012
Organizations that take a wait-and-see approach to analytics are falling behind their more determined peers. Read to find out more.
Tags : 
ibm, technology, netezza, analytics, enterprise analytics, business analytics, application integration, analytical applications
    
Destination Analytics
Published By: Skillsoft     Published Date: Mar 27, 2015
Everyone wants to win, not everyone knows how. Winning isn’t only important for top executives but for everyone — from the boardroom to the mailroom — who wants to get ahead and help his or her organization. The two are intertwined. For an individual, winning is personal. In the business world, winning is multidimensional. The successful salesperson, for example, helps not only himself but also his company and everyone connected with it. Even the most talented businessperson with the best intentions will get nowhere unless he or she knows how to win in today’s complex business world. Business is a game, and winning that game is a total blast! Download Winning by legendary CEO, Jack Welch with Suzy Welch and learn how to be on the winning team.
Tags : 
leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers, jack welch, human resources
    
Skillsoft
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Kaseya     Published Date: Apr 04, 2013
The role of the CIO is suffering. Take back your place in the boardroom by transforming IT from an operational entity to a more strategic, revenue-generating role within the organization.
Tags : 
cio, strategy, revenue, roi, business goals, job roles
    
Kaseya
Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing, remote video conferencing, video conferencing software, boyd video conferencing, video conferencing applications, software development
    
Arkadin
Published By: Success Factors     Published Date: Jul 10, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology, human resources
    
Success Factors
Published By: Polycom     Published Date: Jun 08, 2016
"Over the years, the features, functions, and capabilities offered by group video conferencing systems have expanded and evolved. And the requirements and expectations of collaboration users have changed along with them. This 2016 Buyers Guide helps end users understand the features and functions needed to collaboration-enable five of the most common spaces found in enterprises of all sizes; - small (huddle) rooms - teaming spaces - standard meeting rooms - executive boardrooms - reconfigurable (and perhaps divisible) spaces Download the ""2016 Buyers Guide: Making Smart Group Video Collaboration Decisions"" by Wainhouse Research that will help you make informed decisions regarding your video collaboration strategy."
Tags : 
best practices, budget, business optimization, business management, collaboration, business intelligence
    
Polycom
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, network security
    
IBM
Previous   1 2    Next    
Search      

Special Report

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory