pto

Results 1 - 25 of 436Sort Results By: Published Date | Title | Company Name
Published By: 1010data     Published Date: Nov 28, 2018
This report analyzes the changes within the grocery industry during July 2017 June 2018 (the year following Amazons acquisition of Whole Foods) and delivers a view of grocerys biggest disruptors and unforeseen consumer trends.
Tags : 
    
1010data
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, hacker detection, identity management
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business analytics, business integration, business management, business process automation, business process management, groupware workflow, product lifecycle management
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security, manage, protect, application security, authentication, disaster recovery, encryption, internet security, intrusion detection, intrusion prevention, network security appliance, security management, security policies, vulnerability management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, application security, disaster recovery
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple iOS devices (iPhone, iPod Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop, security management, security policies, data protection, database security, vulnerability management
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Dysart Unified School District (DUSD) is Arizona's fastest-growing school district. Despite the district's extremely rapid expansion, it remains focused on its mission of "Increasing in Excellence" - or, preparing students for life in the new century.
Tags : 
laptop learning, dysart, dusd, arizona, students, application integration, best practices, business integration, business intelligence, business management, enterprise resource planning, it spending, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security, application integration, application performance management, best practices, business process management, enterprise resource planning, it spending, project management, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Adobe     Published Date: Mar 03, 2017
Its amazing how online and offline data remains disconnected. Sculptor and conservationist, Jason deCaires Taylor knows the benefits of connecting two different worlds. In our guide, The Art of Integration, youll see what marketers can learn from the symbiotic relationship of Taylors sculptures on the floor of Molinere Bay. Read the guide to learn how to piece together all your insights and interactions into a whole view of your customers, so you can create seamless experiences with them.
Tags : 
integrated marketing, online and offline integration, adobe integration guide, seamless experience, data integration
    
Adobe
Published By: Adobe     Published Date: Jun 22, 2017
Its amazing how online and offline data remains disconnected. Sculptor and conservationist, Jason deCaires Taylor knows the benefits of connecting two different worlds. In our guide, The Art of Integration, youll see what marketers can learn from the symbiotic relationship of Taylors sculptures on the floor of Molinere Bay. Read the guide to learn how to piece together all your insights and interactions into a whole view of your customers, so you can create seamless experiences with them.
Tags : 
customer experience, connectivity, integration, customer insight, customer interactions, marketing relationships
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Customers expect to have the same experience with a store no matter where they are shopping in a brick and mortar location, on the stores website via laptop or on the stores app via mobile device. Combining online and offline data helps retailers stay informed about their customers so they can drive customer loyalty and increase revenue.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Airfare is increasing. Car rentals are down. Ecotourism is at an all-time high. The truth is, travel and hospitality is in flux. Read the Adobe Digital Insights report US Travel Trends in 2017 to see whats going on in the industry, including major trends and predictions. Youll learn all about: What motivates todays customers to book travel reservations Why virtual (VR) and augmented reality (AR) are new disruptors in the industry Travel predictions for Summer 2017, including major holiday weekends
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
Just off the coast of Grenada, West Indies, in the depths of Molinere Bay, marine life thrives amid an eerie art installation of lifelike mixed-media figures. Sculptor and conservationist Jason deCaires Taylor is the visionary behind this first-ever underwater sculpture gallery. Created as more than a unique place to showcase his talents, his art allows people, marine life, and fragile underwater habitats to coexist in harmony.
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend wont continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Previously, wireless added a useful layer of mobility to your wired infrastructure. Now, you have users who may never connect with cables. Before, laptops and desktops were the primary tools of productivity in the office. These days, smartphones, tablets and apps are essential, whether users are on the move or at their desks.
Tags : 
device, iot, vlans, unified access, applications, analytics, healthcare
    
Alcatel Lucent Enterprise
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Anaplan     Published Date: Sep 07, 2018
Viele Menschen arbeiten gern mit Spreadsheets, beispielsweise zur Verwaltung ihrer persnlichen Finanzen. Aber in einem professionellen Umfeld, in dem mehrere Personen Zugriff auf Daten bentigen, um die zu aktualisieren und zu ndern, gelangen Spreadsheets schnell an ihre Grenzen. Trotz aller Unzulnglichkeiten und Probleme werden Spreadsheets jedoch nach wie vor fr die Planung und Analyse in Unternehmen eingesetzt. Das mag daran liegen, dass ihre massive Verbreitung auf Desktops und Laptops den Eindruck vermittelt, es wrde sich um eine kostengnstige Option handeln. Wenn Sie Ihre Daten besser im Griff haben mchten und die Planung und Analyse nicht mehr mit Spreadsheets durchfhren mchten, ist Anaplan die richtige Alternative: Die Plattform bietet ihnen nmlich nicht nur die intuitive Bedienung und Nutzerfreundlichkeit von Spreadsheets, sondern auch die Sicherheit und Skalierbarkeit einer Enterprise-Lsung
Tags : 
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.