browse

Results 1 - 25 of 165Sort Results By: Published Date | Title | Company Name
Published By: Ademero     Published Date: Oct 04, 2010
Managing accounts payable is a common practice in every commercial establishment. Whether you deal with goods or provide services, materials and supplies have to be purchased to conduct ordinary business.
Tags : 
document management, paper capture, paper scanning, workflow management, paperless office, document storage, automated workflow, retention policies
    
Ademero
Published By: Adobe     Published Date: Sep 04, 2014
More than ever, customers are turning to their mobile devices to browse, shop, and research. This increase in usage puts pressure on marketers to create effective mobile moments. In Re-Engineer Your Business For Mobile Moments, Forrester takes you through the mobile mind shift and gives you four effective steps to rise up to the challenge of these critical mobile moments.
Tags : 
mobile marketing, mobile enterprise, mobile trends
    
Adobe
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Common browser vulnerabilities used to execute these attacks What attackers do next to take control of the system How to catch it before the attacker moves further into your network
Tags : 
    
AlienVault
Published By: Avaya     Published Date: Mar 10, 2016
The digital revolution has happened. Commerce is changing again, unbound from prior models. Goods and services are sold and information exchanged in ways we never imagined a few years ago. Think Uber and Airbnb—digital business models like this are replacing last year’s browser-based businesses.
Tags : 
digital advertising, commerce, business optimization, content delivery, network management, best practices
    
Avaya
Published By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
Published By: Bronto     Published Date: Jan 20, 2017
In this paper you'll learn: Why browse recovery is a critical component of lifecycle marketing. Best practices for executing a successful program. Demonstrated metrics from an online retailer.
Tags : 
bronto, e-commerce, customer lifecycle, browse recovery
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto
Published By: Bronto     Published Date: Jul 25, 2017
Average eCommerce conversion rates range from 2 to 5%. Yet, many retailers are reluctant to automate browse recovery emails because they have these questions: How will consumers respond to emails generated from an online shopping session? Will they view the emails as intrusive? Will that increase my unsubscribe rates? Will automated browse recovery emails really get shoppers to come back and buy from my website? If you haven't started using a browse recovery strategy, or if you have but haven't seen the same ROI, you're in the right place. Here is the four-step game plan we developed based on our customers who have been the most successful in applying a browse recovery strategy.
Tags : 
browse recovery, recovery emails, online shopping, ecommerce, browse recovery strategy
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: • How effectively brands are using customer data to nudge them back onto the purchase path. • How triggered messages can better engage customers and keep them coming back. • How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : 
revenue, email, internet, retailer, website
    
Bronto
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
• Verwenden Sie CA Live API Creator, um funktionierende Prototypen in Stunden zu liefern. Konvertieren Sie Unternehmensanforderungen in eine funktionsfähige Software. • Nicht nur für Wireframes, sondern auch für funktionierende Systeme, Datenbanken, Logik und Benutzeroberflächen. Es ist so einfach wie eine Kalkulationstabelle und geht auch so schnell. • Beeindrucken Sie die Anwender im Unternehmen, indem Sie innerhalb von Stunden Ergebnisse liefern und Feedback zum Datenmodell und zur Logik einholen. Iterationen sind unmittelbar möglich. • Alles, was Sie benötigen, ist enthalten. Es muss keine IDE installiert oder konfiguriert werden. Verwenden Sie einfach Ihren Browser.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
• Use CA Live API Creator to deliver running prototypes in hours. Convert business requirements into working software. • Not just for wireframes, but also for running systems, databases, logic and user interfaces. It’s as simple as a spreadsheet and just as fast. • Impress your business users with results in hours to get their feedback on the data model and logic. Iterate instantly. • All you need is in the box. No IDE to install or configure. Just use your browser.
Tags : 
    
CA Technologies
Published By: Campaigner     Published Date: Jan 09, 2007
This white paper provides powerful tactics to help you grow bigger, better and more relevant opt-in lists — and turn your Web browsers into buyers.
Tags : 
opt in, opt-in, list management, email list
    
Campaigner
Published By: Campaigner     Published Date: Jan 08, 2007
Email marketing is by far the best way to attract interest in, build desire for, and generate sales of your products and services. Without a well-managed opt-in email list, you can say goodbye to your email marketing investment. This white paper provides powerful tactics to help you grow bigger, better and more relevant opt-in lists - and turn your Web browsers into buyers.
Tags : 
email marketing, opting in, opt in, opt-in, email lists, list rentals, ebusiness, return on investment
    
Campaigner
Published By: Catalyst SF     Published Date: Feb 29, 2008
This white paper has been written for executives at media publishing and content companies interested in learning about the exploding “non-streamed” or portable video market and finding out about best practices for driving revenue through advertising in this medium.
Tags : 
downloadable video, downloadable media, video, catalyst, catalyst sf
    
Catalyst SF
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.