post

Results 276 - 300 of 463Sort Results By: Published Date | Title | Company Name
Published By: Trillium Software     Published Date: Jun 06, 2011
Hear Andy Hayler from the Information Difference discuss these challenges as he presents the findings of his research report, "Building a Robust Business Case for High Quality Master Data".
Tags : 
trillium software, operational data quality, mdm solution, business case, andy hayler, high quality master data, post-implementation review, business intelligence, data quality, data warehousing
    
Trillium Software
Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.
Tags : 
watchguard technologies, cloud-based security, protection, network security, malware threats, cybercriminal, anti spam, anti spyware, anti virus, data protection
    
WatchGuard Technologies
Published By: Adobe     Published Date: Sep 23, 2019
Email provides the wedge into customer-obsessed marketing Every day, demanding customers, unforeseen competition, and disruptive new technologies hammer home that we have entered the age of the customer, where established business operations don't work. Yet most marketing functions still rely on decades-old methods that undermine their ability to create post-digital brand experiences and help their firms become customer focused. Email marketing the workhorse of the marketers toolkit can provide a way to launch customer obsessed marketing at your firm, if you use it as more than just a promotional vehicle. marketers need a more advanced email marketing program. 95% believe they would benefit from it. 64% agree that they use their email marketing program as a strategic asset for innovation But its difficult to achieve. 91% experience challenges, including lack of budget, vision, and cross-collaboration WHY TARGET AUDIENCE SHOULD CARE? Smart CMOs re
Tags : 
    
Adobe
Published By: IBM     Published Date: Dec 03, 2008
When the IBM System x3350 was compared directly with Dell's PowerEdge R300 under the new SPECpower ssj_ops/watt benchmark, the IBM server scored more than 15 percent better than the equivalent from Dell. See all the details in this special report.
Tags : 
ibm, express seller, ibm system x3350, dell poweredge r300, ibm performance report, storage, raid, storage virtualization, server virtualization
    
IBM
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, internet security, secure instant messaging, web service security, mobile data systems, wireless messaging, data protection
    
Proofpoint
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an all-or-nothing paradigm, instead preferring a pragmatic, evolution, not revolution approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud at least not in the foreseeable future. Thats why so many IT professionals advocate a so-called hybrid approach. But what do we mean by hybrid and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio, cloud computing
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: Dec 17, 2012
This seminar will show you how next-generation solutions are solving the "big data" challenge, and are providing enterprises with the visibility and analysis they need to move from post-incident forensics to pro-active and fraud intelligence.
Tags : 
ibm, big data, government, data management, visibility, business intelligence, it management
    
IBM
Published By: dynatrace     Published Date: Mar 04, 2015
Will your online business actually be able to keep up with increased demand and the increasingly less forgiving expectations of your users when your big event season occurs? If youre not sure, or even if you think you are, this brief guide and check list can help you as you head into your peak online period. This guide summarizes feedback from hundreds of leading companies that weve worked with and creates what most would consider a survival guide for any big season or peak online event. The ultimate goal is high conversion rates, followed by implementing changes based on lessons learned post-event. In addition, this guide will help teams plan for the explosion of todays mobile online shoppers!
Tags : 
survival guide, conversion, online business, mobile, shoppers
    
dynatrace
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
Every year some new shiny object seems to be working security marketers into a frenzy. The Advanced Persistent Threat hype continues to run amok 3 years in, and doesnt seem to be abating at all. Of course there is still lot of confusion about what the APT is, and a Securosis post from early 2010 explains our view pretty well.
Tags : 
dell, dell secureworks, cisos, advanced attackers, apt, attack process, security
    
Dell SecureWorks
Published By: Aon Hewitt     Published Date: Sep 14, 2016
Retiree Health Care Design and Strategy in a Post-Reform Environment: Continued Growth of Exchange-Based Strategies
Tags : 
    
Aon Hewitt
Published By: AWS     Published Date: Oct 30, 2018
Centrify a leading cybersecurity company needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organizations cybersecurity maturity doesnt happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after youve made an initial investment in security. This white paper, Where to Invest Next: Guidance for Maturing Your Cyber Defenses, offers practical advice on achieving the level of cyber defense maturity thats right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. Youll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a nice to have, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, Threat Intelligence: Cybersecuritys Best Kept Secret, offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTIs effectiveness in thwarting todays most dangerous and sophisticated attackers. Youll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analysts findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 21, 2017
February may have been the official American Heart Month - but it's never too late for you and your employees to take better care of your tickers. Fitbit Group Health has designed a poster and three tip sheets, that you can share within your organization. Your employees will get the heart-healthy advice they need, and youll get to shine as the wellness rock star that you are. Things to keep in mind as you download the kit: * The posters and tip sheets can be shared any number of ways, including via print, email, or uploaded to your company intranet. * Consider hanging the poster in well-trafficked areas like your lobby, kitchen, and hallways. * Think about giving one tip sheet a week to keep heart health top of mind. Enjoy the poster and tip sheets and good for you, for helping your employees love their hearts this month.
Tags : 
    
Fitbit
Published By: The Economist Group     Published Date: Feb 13, 2019
This paper will highlight our five key findings to achieve more successful content marketing campaigns. Brands can use these insights pre-mid-and post-campaign to maximise marketing ROI.
Tags : 
marketing, digital marketing, marketing roi, content marketing, social media marketing, lead generation, best practices, marketing automation, return on investment
    
The Economist Group
Published By: VMware AirWatch     Published Date: Nov 12, 2015
avec VMware Les postes de travail et applications Windows sont des lments vitaux pour lentreprise encore aujourdhui, malgr ladoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail nont pas su voluer au fil des ans. Lheure de la transformation du poste de travail a sonn.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms
    
VMware AirWatch
Published By: RolePoint     Published Date: Apr 12, 2016
Over the last three years, social networks have experienced exponential growth. Employee networks have grown accordingly, offering access to structured career data through sites like LinkedIn in particular, and unstructured data through networks like Facebook. Employees are continually adding new contacts and growing personal networks. Job posting tools that share jobs into social networks are often described as social referral tools, though this is an inaccurate and misleading description. The more sophisticated of these tools create unique links for sharing that enable employers to identify which of their employees originated the share. This is useful for recognition and reward, whilst the practice of sharing jobs in the wider network is to be encouraged in order to reach job seekers who are browsing or using search engines to identify opportunities. Job seekers are increasingly connecting with their peers in organizations they want to work for. Encouraging employees to share jobs in
Tags : 
rolepoint, social referral, facebook, linkedin, career data, personal network, data management
    
RolePoint
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, identity management, internet security, policy based management, security management, security policies
    
Qualys
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Citrix Online     Published Date: Sep 03, 2009
Setting the tone for your Webinars is crucial, from initial promotion efforts all the way through delivery of content and post event follow-up. How you interact with your prospects will determine whether they advance along the sales cycle or lose interest.
Tags : 
webinar, web analytics, lead generation, leads, sales, conversion, conversion rate, webinar, citrix, testing, measuring, analyzing, email marketing, email
    
Citrix Online
Published By: Cornerstone OnDemand     Published Date: Oct 15, 2010
Grass Valley, the world's second largest broadcast and professional solutionssupplier, is a leading provider and innovator in media production services and technology. Their cameras, production equipment, servers and other systems are the choice of many of the largest broadcast networks and production/post-production facilities around the globe. Read this case study to find out why they chose Cornerstone OnDemand.
Tags : 
cornerstone, grass valley, training, web-based training
    
Cornerstone OnDemand
Published By: Moreover Technologies     Published Date: Mar 09, 2011
Looking for the proverbial business intelligence needle in a haystack? Need online media monitoring that's laser-focused on business-not consumer-interests? Want both news and social media posts unified and delivered to you through a convenient single-portal report? If so, look beyond Google for focused, customizable business information.
Tags : 
moreover, google, consumer, business information, social media, news
    
Moreover Technologies
Published By: iCIMS     Published Date: Sep 30, 2013
View this webcast from iCIMS to learn wyas to take your employee referral program to the next level with the use of social media and how to use best-of-breed tech to optimize your job postings over SEO and mobile platforms.
Tags : 
icims, social recruiting, new employees, hiring management, new talent, talent pool
    
iCIMS
Published By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : 
icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues, hr trends, screen employees, best practices, workforce management
    
iCIMS
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.