RSS feed Get our RSS feed

News by Topic

advice

Results 126 - 150 of 310Sort Results By: Published Date | Title | Company Name
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data
     Worldpay
By: Dell-Intel     Published Date: Jun 19, 2009
Despite progress in virtualization, much development still remains. With predictions that virtualization will become pervasive, this research highlights forthcoming challenges and strategic issues facing IT planners. Register now for this free Gartner report sponsored by Dell and Intel to receive important advice on how to deal issues such as heterogeneity, resources and performance optimization, and the increasing fragmented tool market.
Tags : dell, intel, virtualization, gartner, it planner, server virtualization, servers, ovf
     Dell-Intel
By: Jive Software     Published Date: Oct 08, 2009
Learn best-practices for implementing a social software strategy, as leaders from Nike, Cisco, and Forrester share advice and anecdotes in a Social Business Software Roundtable discussion.
Tags : cisco, jive, social software strategy, social media tools, online communities, internal social network, social business software, social media marketing
     Jive Software
By: Jive Software     Published Date: Oct 12, 2009
Priority Club Connect encourages members to talk directly with IHG management through a video blog on the community and to participate in special offers available only through the community. Listen to this webcast recording to get strategies and advice for your own social media initiatives.
Tags : social business software, social media, online community, customer loyalty, jive, social media marketing
     Jive Software
By: Jive Software     Published Date: Oct 12, 2009
Powering the ecosystem with the Collaboration Workspace, a branded online community, helps SAP continue its tradition of industry leadership and customer value. Watch this on-demand webcast to get strategies and advice for your own social media initiatives.
Tags : ecosystem, jive, collaboration workspace, sap, online community, social media, validation, customer feedback
     Jive Software
By: Red Hat     Published Date: May 17, 2012
This paper, the first in a series of 4, offers practical advice for cutting through the clutter and getting started with a private or hybrid cloud strategy that successfully builds on your current data center.
Tags : 
     Red Hat
By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
     CREDANT Technologies
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior
     Skillsoft
By: CDW     Published Date: Nov 13, 2012
Guidance for finding a vendor who can provide advice and insight into your unique security environment.
Tags : cdw, security assessor, unique security environment.
     CDW
By: Compuware     Published Date: Aug 30, 2013
Download the 2013 State of the Art and Trends and know the latest in application performance management (APM). This collection of best practice articles provides practical advice for managing the key application performance challenges you will face in 2013.
Tags : 
     Compuware
By: Socrata, Inc     Published Date: Dec 02, 2013
Get Step-By-Step Guidance for Government Open Data Success from Socrata, the Global Open Data Leader.
Tags : open data, open data platform, open data portal, open data policy, open data program, open data kit, open data field guide, new york city open data
     Socrata, Inc
By: Polycom     Published Date: May 12, 2015
Infographic featuring ten pieces of advice for successfully addressing issues with compliance, customers, competitiveness, and complexity.
Tags : polycom, enterprise, collaboration, fsi, compliance, customer
     Polycom
By: Rackspace     Published Date: Jul 23, 2019
Coupling recommendations from the Rackspace DevOps Accelerator engagement with expert advice from Rackspace applications specialists, TotalTrax deployed Fanatical Support for AWS and integrated cloud-based containers to manage customer deployments faster and automate processes.
Tags : 
     Rackspace
By: SAP     Published Date: Feb 26, 2016
In this document, we’ve pulled together relevant research and advice based on both expert research and the experiences of our own customers.
Tags : sap, human resources, research, analytics
     SAP
By: FICO     Published Date: Mar 02, 2018
Sales and Operations Planning (S&OP) isn’t just about aligning supply and demand. Ultimately, businesses across all industries need to synchronize plans across all functions to strike the right balance between demand, resources and other constraints. Companies are realizing that their use of analytics to help improve decision making needs to evolve beyond just reporting to include machine learning and optimization. Download our latest Q&A now with published author and supply chain expert Mike Watson, and learn how virtually any S&OP decision can benefit from advanced analytics and automation. You’ll get practical advice to help build a strawman, so you can move forward quickly – before your competitors! Read this Executive Brief to know the Top 7 Questions to ask before deploying your Sales and Operations planning.
Tags : operations, sales, supplier, inventory, resources
     FICO
By: Infosys     Published Date: May 21, 2018
Our client was a large financial institution with millions of customers using a wide range of products. So when customers called the contact center, they could have any query out of a possibility set of 68 categories. They would want investment advice, or ask about their account. Or they would simply want to reset their PIN. The trouble was that the large range of support offered at the contact center meant long and complex phone calls, as customers often found their way through the interactive voice response (VR) system to the wrong agent. They had to be re-routed-often several times- which gave our clients two problems.
Tags : customer, service, automation, voice, response
     Infosys
By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
     iShares by BlackRock
By: Cohesity     Published Date: Aug 09, 2019
Data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide.
Tags : 
     Cohesity
By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
     Recorded Future
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: Marketo     Published Date: Mar 22, 2018
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders to
Tags : 
     Marketo
By: Intel     Published Date: Jun 10, 2011
Join Intel IT leaders and participating companies HP, Lenovo, Absolute Software, Citrix, and Symantec for a morning packed with the latest technology, expert advice and demos.
Tags : business technology, intel, cloud, data, client security, desktop virtualization, kvm, encryption
     Intel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics