RSS feed Get our RSS feed

News by Topic

downloads

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     Cylance
By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : akamai, akamai gaming, infrastructure, distribution channel, technological advancements
     Akamai Technologies
By: Oracle     Published Date: Feb 24, 2015
To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : oracle, digital marketing, b2b, rfp, feedback, signals, data, behavior
     Oracle
By: Movable Ink     Published Date: Oct 04, 2016
Steve Madden wanted to promote their mobile shopping app in an email. See the campaign and learn how they increased downloads by 68% in our Inkredible 5.
Tags : contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing, e-commerce
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
Steve Madden wanted to promote their mobile shopping app in an email. See the campaign and learn how they increased downloads by 68% in our Inkredible 5.
Tags : contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing, e-commerce
     Movable Ink
By: Akamai     Published Date: Mar 08, 2017
This whitepaper discusses why speed, or throughput, is so critical for today’s Internet users, provides a historical perspective on the Internet’s TCP protocol underpinning and describes how the FastTCP protocol addresses the needs of today’s Internet.
Tags : online video, online video quality, speed, internet, reliability
     Akamai
By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
     Sophos
By: Realtime Publishers     Published Date: Jul 21, 2011
Learn how to execute successful content marketing strategies to target your prospects and advance them towards evaluating your software product or solution.
Tags : realtime publishers, content marketing campaign, it lead generation, software evaluations, drive software downloads, lead nurturing, content mapping, software technology marketing
     Realtime Publishers
By: Magnetrol     Published Date: Nov 05, 2018
Tank overfill is a crucial safety concern in the petroleum industry. Failure to put adequate prevention measures in place has resulted in injuries, loss of life, and billions of dollars worth of damages worldwide. These resources were developed by the level control experts at Magnetrol to help you implement and maintain an effective Overfill Protection Plan for your terminals. Simply click on the downloads below at the Resources section to access this important information.
Tags : 
     Magnetrol
By: Adobe     Published Date: Apr 27, 2016
Discover how to measure and optimize your apps so they keep customers coming back for more.
Tags : adobe, mobile, app, marketing, marketing trends
     Adobe
By: Mitto     Published Date: Jun 09, 2017
A2P (Application to Person) messaging has underpinned this transformation, across a wealth of new use cases and new verticals. Historically, A2P was used for alerts and, as PSMS (Premium SMS), as a billing mechanism and carrier for simple content and services, both for one-off downloads or actions (eg voting) and for recurring payments. The latter use case has declined markedly in the past 5 years, due largely to the transition to an app-based economy, largely driven by card billing and by regulatory action (in markets such as the US and UK) against fraudsters.
Tags : 
     Mitto
By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
     Globalsign Inc.
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, security
     CDW-Trend Micro
By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : downloads, best practices, network management, solutions, technology, advertising
     Cyphort
By: Webtrends     Published Date: May 12, 2010
Whether you're new to email retargeting or a certified segmentation genius, Webtrends Email Exchange makes it easy to send timely, relevant and targeted emails based on your customers' web activity.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, email marketing services/software
     Webtrends
By: Webtrends     Published Date: May 03, 2010
Join Webtrends' Rachel Charlton and Peter Thelen from the Ad Director team for this information-packed webinar as they explain the benefits of bid optimization and demonstrate the results using real life examples from actual clients. This is a can't miss webinar for any marketer who uses paid search.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, web analytics, pay per click (ppc)
     Webtrends
By: Webtrends     Published Date: May 05, 2010
You don't have to look far to find research that shows targeted marketing is most effective. Spray-and-pray tactics barely produce much more than annoyed customers.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics, data management/analytics
     Webtrends
By: Webtrends     Published Date: Dec 19, 2009
According to Forrester, 48% of marketers need help demonstrating ROI on testing. Join Casey Carey, VP of Product and Bob Garcia, Director, Product Marketing and discover how to get ahead of the curve with the business-case answers they provide in this webinar.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, optimization, testing, site
     Webtrends
By: Webtrends     Published Date: Jan 21, 2010
This is a must-see webinar if you want to understand the fundamentals of multivariate testing (MVT), segmentation, and content targeting. Join Bob Garcia, Director of Product Marketing Optimize and Frans Keylard, Director of Optimization as they use real-life examples to explain multivariate testing and teach you where and how to start optimizing.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, mvt, segmentation, optimization
     Webtrends
By: Webtrends     Published Date: May 18, 2010
Mobile marketing investments will likely triple over the next five years. In the haste to stake a claim in the mobile gold rush, many businesses skip the lessons learned from the last big push: to be successful, you'll need to measure and quantify your results with mobile analytics.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics, mobile marketing
     Webtrends
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
     Webroot
By: Intercom     Published Date: Apr 05, 2018
This was our thinking when we began publishing a companion podcast to this blog in the summer of 2015. A blog is an ideal channel when your audience is glued to a screen, actively looking for new information they can quickly read or scanning Twitter for headlines. But what about during a morning office commute? An evening run? A weekend break from the MondayFriday grind of desk work?
Tags : 
     Intercom
By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : endpoint protection, networks, security software, endpoint devices, security
     Webroot Inc
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics