RSS feed Get our RSS feed

News by Topic

act

Results 14076 - 14100 of 14572Sort Results By: Published Date | Title | Company Name
By: WebEx Communications     Published Date: Dec 14, 2007
Through remote desktop sharing WebEx Support Center enables companies to manage and resolve remote support issues — whether they be external customer-driven or internal user-driven. Support personnel can initiate a session with a remote user by sending them an e-mail or providing a URL.Download this Paper to Learn More About a Support Center.
Tags : customer support, helpdesk, help desk, technical support, remote access, roi, spend management, cut costs
     WebEx Communications
By: WebEx Communications     Published Date: Dec 14, 2007
Based on a survey conducted by ServiceXRG, this paper explores the use and effectiveness of remote support technology across all industry sectors and how companies can take remote support to the next level to significantly improve the support transaction process, reduce service delivery costs and increase solution effectiveness.
Tags : remote support, remote access, help desk, helpdesk, customer support, support, customer experience, customer satisfaction
     WebEx Communications
By: WebEx Communications     Published Date: Dec 14, 2007
The purpose of this document is to provide information on the data security features and functions available with WebEx Support Center Remote Support and inherent to the underlying WebEx communication infrastructure known as the WebEx MediaTone™ Network.
Tags : online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos
     WebEx Communications
By: WebEx.     Published Date: Apr 03, 2009
Sales organizations are always looking for ways to boost the performance of their sales teams by making them more effective in the sales process. Recent advances in Internet infrastructure technology and maturity of technologies supporting collaboration over the Internet have resulted in new methods for sales organizations to interact with their customers, collaborate with sales team members, and develop better visibility into their sales pipeline. Today, sales organizations are increasingly embracing real-time Web collaboration tools or Web Meetings to complement their sales processes because these tools can greatly enhance sales productivity and reduce costs.
Tags : webex, web collaboration, collaborative strategies, crm, sales force automation, sales cycles, sales processes, web meetings
     WebEx.
By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles
     WebEx.
By: WebEx.     Published Date: Apr 03, 2009
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. We identify and analyze these challenges, and examine how organizations are leveraging people, processes, technology, and knowledge to address these issues successfully. In addition, beginning in the Executive Summary and continuing throughout the report, we raise questions about troubling trends and offer a new model for overcoming the problematic issues related to the field of sales.
Tags : webex, sales performance optimization, crm, sales force demographics, sell cycle analysis, detailed performance assessment, change analysis, sales knowledge management
     WebEx.
By: WebiMax     Published Date: Nov 25, 2009
It may be easily understood SEO can immensely help marketing efforts, yet with so many providers available, the process of deciding upon a service can be confusing. First, it is important to understand what search engine optimization is and what it can do for your company. Basically, SEO providers employ a number of tactics to gain positive momentum for your Web site on the search engines. Using specific, germane words and phrases related to a site's goods and services, an SEO service helps to make the site widely recognized by consumers and attract more revenue.
Tags : webimax, seo, search engine optimization, optimized, service provider, search engine optimization (seo)
     WebiMax
By: Webmarketing123     Published Date: Oct 06, 2010
There are many ways to increase revenue for your business. One of them is to evaluate and improve the success of your company's website in search results. SEO (Search Engine Optimization) is the practice of optimizing a website so that it achieves higher organic rankings on search engine sites like Google, Yahoo and Bing. In fact, according to the 2009 Forbes Ad Effectiveness survey, SEO is the most effective marketing channel today.
Tags : webmarketing123, seo, search engine optimization, google, yahoo, bing, search, keywords
     Webmarketing123
By: webMethods     Published Date: Aug 21, 2009
Selecting the right business integration vendor is a challenge. While it is essential to focus on what is critical for your company, it is also important to evaluate vendors using a common set of metrics. This document uses customer feedback taken from a broad portfolio of evaluations to offer key factors and considerations to use when selecting an integration software vendor.
Tags : business integration, integration, return on investment, roi, business process management, bpm, vendor selection, business integration software
     webMethods
By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
     Webroot
By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
     Webroot
By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
     Webroot
By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : web threats, data loss, security, web gateway, web attacks, security breach
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
     Webroot
By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : web threat, security, could, saas solutions, webroot
     Webroot Inc
By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we look at 3 new approaches that can make antivirus effective and practical again, including client/cloud architecture, behavior recognition, and journaling and rollback Together, these three approaches represent a major rethinking of antivirus technology, a major shift in antivirus that creates a new type of technology that is able to detect and counter today’s Malware.
Tags : antivirus, journaling. rollback, behavior recognition, client/cloud, client/cloud architecture, antivirus technology, malware, security
     Webroot Inc
By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : endpoint performance, performance testing, security software, security
     Webroot Inc
By: Webroot Inc     Published Date: Jan 15, 2015
The old canon of long-lived viruses with random targets created by hacktivists for fame or nuisance has given way to a new generation zeroday/hour threats from organized criminals, with hand-picked targets and specific, malicious intent. In mid-2014, on a daily basis, Webroot saw 25,000 new malicious URLs, 777,000 new unknown files, many of which are malicious, and 1,000 new phishing sites. In the face of such exponential growth, traditional, reactive security can’t hope to keep up. Not only is the volume of unknown threats overwhelming existing security solutions, but the unique characteristics of unknown threats are also making it difficult for traditional security to catch them.
Tags : threat intelligence, malicious ip activity, reactive security, security solutions, security
     Webroot Inc
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : endpoint performance, software security, endpoint security products, performance metrics, security
     Webroot Inc
By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
     Webroot Inc
By: Webroot UK     Published Date: Jan 24, 2013
The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : webroot, secureanywhere, endpoint protection
     Webroot UK
Start   Previous    557 558 559 560 561 562 563 564 565 566 567 568 569 570 571    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics