client

Results 976 - 1000 of 1112Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
Security software and settings on your web server are up-to-date. Your Internet browser and client are up-to-date. Your client computers are free of malware. You keep an eye on the expiry date of your organizations TLS/SSL certificates and replace them in a timely manner.
Tags : 
tls/ssl, application best practices, security software, malware, software settings, security
    
Symantec
Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault
Published By: Act-On     Published Date: Aug 18, 2014
Your clients are doing more online marketing and they expect you to help and guide them. Learn how you can use marketing automation tailored for agency needs to help your clients succeed and to grow your business. Discover the nine essentials on how marketing automation for agencies can give you a sharper competitive edge.
Tags : 
act-on, marketing, online, agency, automation
    
Act-On
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the worlds largest business law firms.Michael and his team oversee the firms meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLAs 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each persons role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. Its a win-win.
Tags : 
    
Seamless
Published By: IndustryBrains     Published Date: Jan 16, 2007
Based on the principle that not all clicks are equal, IndustryBrains’ site-specific content targeting solution enables Direct Agents’ financial and technology direct marketing clients to reach the highest quality audience.
Tags : 
industrybrains, pay per click
    
IndustryBrains
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
In August 2007, EmailStatCenter.com launched its First Annual State of Email Metrics survey. Approximately 55% of respondents were from client side and 45% from agencies or ESPs. Download this study to find out what the email professionals want and need in the coming years.
Tags : 
brightwave, email, ctr, click through, click-thru, conversion, email marketing
    
BrightWave Marketing
Published By: Infacta     Published Date: Jan 22, 2007
In this report, we will review the Can-SPAM Act and set out 5 key requirements that will ensure that our email is considered legitimate by our customers, email clients and ISPs.
Tags : 
permission, email permission, permission email
    
Infacta
Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management, aladdin
    
Aladdin
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing, software license, compliance, appsense, it management, active directory, servers, windows, desktop management
    
AppSense
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada, servers
    
Bocada
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Published By: Connectus     Published Date: Aug 21, 2009
Long ago dubbed the 'killer app', email marketing has now reached the height of its potential and is poised to assume its place as the medium of choice for maintaining customer relationships. In fact, despite the threat of spam, marketers are continuing to turn to email marketing initiatives - with impressive results. Email marketing continues to be the most affordable, efficient and personalized way to connect with clients and future prospects.
Tags : 
crm, customer relationship management, customer relationship lifecycle, email marketing, customer loyalty, loyalty and retention, loyalty, retention, customer communication, ebusiness, e-business, connectus, enterprise applications, customer service, marketing automation, sales & marketing software, sales automation
    
Connectus
Published By: IBM     Published Date: Feb 13, 2007
This paper provides an overview of opportunities and benefits of business communications integration and includes two "before and after" scenarios - one in financial services and one in healthcare - that demonstrate how IBM clients have benefited from integrated business communications.
Tags : 
networking, convergence, ip telephony, application integration, business integration, ibm, business innovation, ip faxing, network convergence, ip networks, collaboration
    
IBM
Published By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : 
ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access, server virtualization, desktop management
    
IBM
Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep, web portal, web services, content management system, information management, records management
    
IBM
Published By: IBM     Published Date: Mar 04, 2009
Download IBM® Lotus® Sametime® Standard V8.0, a platform for unified communications and collaboration that combines security features with an extensible, open solution including integrated Voice over IP, geographic location awareness, mobile clients, and a robust Business Partner community offering telephony and video integration. Lotus Sametime Standard V8.0 expands on the existing instant messaging, Web conferencing, VoIP, point-to-point video, mobile clients, external IM gateway, and extensible client with additional platform support and enhancements to the end user experience, administration, and performance.
Tags : 
ibm, lotus, sametime, communications and collaboration, instant messaging, web conferencing, voip, point-to-point video, mobile clients, external im gateway, extensible client, wireless, enterprise applications, mobile computing, mobile workers, wireless infrastructure, video conferencing, voice recognition, voice over ip
    
IBM
Published By: IDFocus     Published Date: Aug 21, 2009
HRFeed is one of the most critical elements of every Identity Management or User Provisioning solution. This document outlines the different business and technical challenges that IDFocus faced when building successful HR-to-Provisioning integration for several clients.
Tags : 
identity management, human resources, hrfeed, identity management, user provisioning, system integration, idfocus, password management
    
IDFocus
Published By: iDirect     Published Date: Aug 21, 2009
The Internet boom continues to grow as more and more businesses, residential and SOHO clients start using the Internet. As service providers begin to scale their networks to accommodate this tripledigit growth, traffic engineering and scalability of the network has been of utmost importance.
Tags : 
soho, soho security, service providers, network scalability, traffic management, network expansion, idirect
    
iDirect
Published By: ISYS     Published Date: Mar 26, 2007
Outlook, Hotmail, Yahoo!, AOL and more recently Gmail- the number of different email systems people use to read email in the UK market is seemingly endless. The purpose of this document is to help designers and marketers alike understand email HTML to help maximize your readability, deliverability and campaign effectiveness.
Tags : 
email marketing, newsletter design, deliverability, readability, enewsletter, e-newsletter design, adestra
    
ISYS
Published By: OpSource     Published Date: Aug 21, 2009
SaaS is vastly different from traditional client-server software. Learn how to adapt a single instance, multi instance, or multi tenant application for effective SaaS delivery.
Tags : 
saas, software as a service, saas delivery, software development, service management, opsource, web development, web services, web service security
    
OpSource
Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile, sybase, wireless, network architecture, mobile data systems, mobile workers, wireless application software, wireless infrastructure
    
Sybase
Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention, access control, high availability, symantec, network security, anti spyware, application security, intrusion detection, security management
    
Symantec
Published By: Quocirca     Published Date: Mar 12, 2009
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. However, changes in software, hardware, security and management systems are leading towards server-based computing being suitable for a far larger proportion of an organization's user base.
Tags : 
quocirca, desktop environment, software, hardware, security, management systems, data security, business continuity, asset life cycles, tco, server-based computing, security, information management, enterprise applications, data management, business management, total cost of ownership, database security
    
Quocirca
Published By: SpringCM     Published Date: Dec 07, 2006
Learn how web services integration enabled Priority Solutions’ clients and vendors to access documents in the SpringCM repository via the company’s self-service Web portal.
Tags : 
content management, document management, content management system, collaboration, web portal, portals, internet portal, springcm, spring cm, knowledge management, web service management, content delivery, content integration, corporate portals, information management, records management
    
SpringCM
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.