IDC PERSPECTIVE Validating the Known: A Different Approach to Cybersecurity

This white paper discusses a new approach, detecting the bad or malicious to cyber security: validating the known. Although there are new innovative new offerings in the cyber security market, the majority of today’s technologies take fundamentally the same approach. A new approach is validating the known, looking to validate objects as good or valid…

Read More

Keeping Travelers Safe Through Travel Risk Management (TRM)

This whitepaper presents results from a survey of Travel Managers, Security Officers, HR personnel, and other personnel in North America conducted by the GBTA Foundation in partnership with Concur, and focuses on two main areas: (1) adoption and composition of Travel Risk Management (TRM) protocols domestically and internationally and (2) traveler tracking and communication. The…

Read More

FIVE TRENDS FOR CFOs TO WATCH : How analytics, robotics, next-gen cloud computing, cybersecurity, and evolving budget tools will shape tomorrow’s organizations

CFOs are tasked with ensuring that the accounting basics, such as processing payments and recon¬ciling accounts, are handled without a hitch. But simply having the bare minimum in terms of finan¬cial infrastructure won’t get an organization, or a career, very far. This white paper outlines five financial technology trends that CFOs need to consider as…

Read More