"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

loss

Results 251 - 275 of 465Sort Results By: Published Date | Title | Company Name
Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
Adaptive Infrastructure provides fast and reliable access to data and the applications that rely on that data. When a problem occurs, you better be able to get things running again in a very short order. There are multiple solution architectures available to provide reliable access to data and applications - find out more now.
Tags : 
storagecraft, infrastructuer, back up, recover, adaptive, avoid loss, resources, vulnerabiilty, infrastructure, backup and recovery, application security, disaster recovery
    
StorageCraft® Technology Corporation
Published By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : 
tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi
    
IBM
Published By: SendGrid     Published Date: Jun 07, 2012
If your customers don't receive your messages, you lose revenue and suffer low customer satisfaction rates. What is the impact of a 20% loss in communication to your business?
Tags : 
sendgrid, communication, transaction, email, ips, spam, customers, smtp email, smtp relays, mail smtp server, smtp email servers, smtp email server
    
SendGrid
Published By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : 
dlp, data loss, security, best practices, access control, authentication, security management, security policies
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
An effective data loss prevention program requires the right technologies and policies in place and working together.
Tags : 
dlp, leakage, security, strategy, security management, security policies
    
CDW
Published By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : 
cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information, denial of service attacks, pilferage, security, it management
    
McAfee
Published By: Sage     Published Date: Mar 26, 2014
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting, business intelligence, productivity, sarbanes oxley compliance
    
Sage
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Whether it’s worrying about a possible break-in or an employee theft, protecting your business is always a concern. For busy warehouses and manufacturing companies, the worry is even greater, as time lost to responding to a crime means revenue loss. With expensive inventory, an active production site, and workers entering and leaving around the clock, reliable security is a must.
Tags : 
tyco, security, threat, employee theft
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : 
tyco, security, commercial, loss prevention
    
Tyco Integrated Security
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: DocuSign     Published Date: Mar 23, 2016
The research study highlights include: • More than 80% of interviewed decision makers noted a clear or pressing need for Digital Transaction Management (DTM) solution • 98% of companies reported revenue impact from poor transaction management • 37% of companies estimating revenue loss to be 11% to 25% 400 business leaders from around the world weighed in. All with responsibilities for document-intensive business processes and selecting and managing transactional technologies. This study reveals what’s keeping them up at night.
Tags : 
    
DocuSign
Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Apr 04, 2017
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
    
LogRhythm
Published By: Cyren     Published Date: Jan 03, 2018
Do you know what happens during the first 60 minutes of a phishing attack? In this paper, security industry analyst Derek Brink, a Research Fellow at Aberdeen Group, crunches real-world data and measures the business risks of phishing attacks, including calculating the costs of phishing to businesses, the probability of small and large losses, and the ROI on incremental investments in advanced security to prevent phishing.
Tags : 
it security, cyber threat, security risks, web security, smb, mid size business, security threats, security solutions, phishing, security, internet threats, cyberthreat, data breach, cyber attack
    
Cyren
Published By: Carbonite     Published Date: Feb 22, 2017
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
backup, disaster, recovery, bdr, carbonite, environment
    
Carbonite
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : 
unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
    
McAfee
Published By: Oracle     Published Date: Aug 19, 2016
This white paper goes into detail about Oracle's cloud-scale zero data loss recovery appliance.
Tags : 
    
Oracle
Published By: InsideUpbg     Published Date: May 21, 2015
I. What Exactly is a Vehicle Tracker II. Does My Business Need a GPS Tracking System? III. Saving Money IV. Compelling Reasons to Consider GPS Fleet Tracking (Infographic) V.10 Impotant Features of GPS Fleet Maintenance Software VI. Important Trends In GPS Tracking VII. Glossary
Tags : 
    
InsideUpbg
Published By: Marathon Technologies     Published Date: Sep 18, 2009
There are many expensive, complex technologies that promise high availability for SQL. Fortunately there are also simple, automated ways to get the highest levels of protection. The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, availability, infrastructure, network architecture, network management, server hardware, servers, microsoft exchange, windows server
    
Marathon Technologies
Published By: Qualys     Published Date: Feb 04, 2010
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, security management, security policies
    
Qualys
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free IDC analyst report, discover why coordinating the activities of marketing and sales—from day one of the revenue cycle—is essential for profitability. Learn how to stop the revenue loss that occurs during a prospect handoff; how to give sales the freedom to target more efficiently, while enabling marketing to build better prospect relationships; and how to choose software that tightens the marketing/sales alignment. Download your copy of this insightful report now.
Tags : 
marketing, sales, alignment, coordination, software, leads, sales leads, demand generation, marketing automation, sales quota, sales training, sales roi, marketing roi, sales efficiency, sales-marketing integration, sales-marketing coordination, crm, customer relationship management, lead nurturing, lead recycling
    
Marketo, INC.
Published By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology, security, security management
    
ThreatMetrix.
Published By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : 
mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

Download this special report to learn how non-tech businesses are beginning to use artificial intelligence at scale.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory