RSS feed Get our RSS feed

News by Topic

eset

Results 1 - 25 of 79Sort Results By: Published Date | Title | Company Name
By: New Voice Media     Published Date: Jul 24, 2017
Sie sind noch nicht lange als Vertriebsleiter im Inside Sales tätig? Oder leiten Sie bereits ein Inside-Sales-Team und möchten lediglich Ihr Wissen auffrischen? Dann sind Sie bei unserem ultimativen Leitfaden für den Inside Sales genau richtig. Hier erfahren Sie alles über die Personalbesetzung, Schulung, Organisation, Motivation und Optimierung Ihres Inside Sales, damit Sie bestmögliche Leistungen erzielen können.
Tags : salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
     New Voice Media
By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : email security, ransomware, phishing, whaling, security strategy
     Mimecast
By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : mobile applications, ebusiness, web design, web traffic, mobile websites
     Akamai Technologies
By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
     ESET
By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : mobile, app, web design, media
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Die Konsumerisierung der Technologie und der Vormarsch mobiler Geräte in neuen und bestehenden Märkten bewegt Unternehmen dazu, enorme Beträge und Ressourcen zu investieren, um ein optimales mobiles Erlebnis für alle Endnutzer zu erreichen. Ohne dedizierte Lösung für die mobile Performance sind ihnen jedoch trotz aller Investitionen Grenzen gesetzt.
Tags : 
     Akamai Technologies
By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization
     Red Hat
By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
     Proofpoint
By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
     Proofpoint
By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed
     CA Technologies
By: Ruckus Wireless     Published Date: May 05, 2016
Passwords kick Wi-Fi’s @ss. About 40% of Help Desk tickets are password related, and some estimates are $118/student/year in password resets. Don’t blame the Wi-Fi, fix the problem.
Tags : ruckus wireless, wifi, certificate wifi, passwords, help desk, education, higher ed
     Ruckus Wireless
By: CEB     Published Date: Sep 04, 2013
B2B buyers are learning on their own and delaying contact with suppliers until late in the purchase. Most B2B marketers are fighting back with thought leadership—but it’s not working. The Challenger Marketing approach helps marketers stand out amongst the noise and more reliably reset the customer’s purchase criteria decisively in their favour.
Tags : content marketing, thought leadership, b2b marketing, demand generation, lead generation, lead generation & automation
     CEB
By: CEB     Published Date: Aug 12, 2013
B2B buyers are learning on their own and delaying contact with suppliers until late in the purchase. Most B2B marketers are fighting back with thought leadership—but it’s not working. The Challenger Marketing approach helps marketers stand out amongst the noise and more reliably reset the customer’s purchase criteria decisively in theirf avor.
Tags : content marketing, thought leadership, b2b marketing, demand generation, lead generation, lead generation & automation
     CEB
By: IBM     Published Date: Mar 29, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: IBM     Published Date: Mar 30, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : eset, antivirus software, malware, it professional, security, crm solutions/software, customer experience/engagement, business intelligence
     ESET, LLC.
By: ESET, LLC.     Published Date: Apr 19, 2011
ESET NOD32 Antivirus 4 protects your business without creating system slowdowns that negatively impact productivity. It is effective against emerging malware and Internet threats as they are released, not hours or days later. Request your free trial today.
Tags : eset, nod32 antivirus 4, free trial, malware, productivity, content management systems, crm solutions/software, customer experience/engagement
     ESET, LLC.
By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : eset, cybersecurity webinar, security manager, it security, crm solutions/software, customer experience/engagement, reputation monitoring, usability
     ESET, LLC.
By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
     ESET, LLC.
By: ESET     Published Date: Jul 28, 2011
Join us as we dive into security environments and uncover what specific capabilities organizations need to look for when selecting their next endpoint security solution.
Tags : webcast, key consideration, eset, endpoint security, security, endpoint
     ESET
By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
     ESET
By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : eset, virus, scada, plcs, stuxnet, malware, siemens, code
     ESET
By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
     ESET
By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
     ESET
By: ESET     Published Date: Sep 07, 2011
We discuss about Internet users' behaviour when it comes to Internet security and the top ten threats of the month.
Tags : eset, threat report, internet security, malware industry, antivirus, cybercrime group, mobile devices
     ESET
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics