RSS feed Get our RSS feed

News by Topic

isp

Results 651 - 675 of 931Sort Results By: Published Date | Title | Company Name
By: Workfront     Published Date: Jul 10, 2014
There’s a long list of clichés often used in the marketing creative services and graphic design environments. Among those is a group of phrases we’ve deemed harmless because we hear them so often. Phrases that, like an optical illusion, seem like one thing when you’re up close, but when you look at the whole picture, turn out to be something else entirely. This ebook takes a step back and exposes five common sayings among creative services teams that sound innocent, but actually signify some serious underlying productivity problems.
Tags : marketing, productivity, creative services, productivity problems, solution, sales
     Workfront
By: Tharpe Robbins     Published Date: Jun 23, 2014
Do you recall the commercial a cellular provider once ran a that displayed cellular-connection “bars” above people’s heads to indicate the signal strength of the connection? Maybe that’s the way we can all look at employee engagement. Employee engagement is measurable, and we call that engagement signal strength (ESS). It’s not a static score, but a dynamic measurement that may change every day depending on what happens at work with a co-worker or supervisor, or at even home. This white paper from TharpeRobbins explains how you can understand your ESS and increase it with smart solutions.
Tags : employee engagement, rewards, awards, recognition, performance recognition, length of service recognition, organization performance, attract talent
     Tharpe Robbins
By: IBM     Published Date: Jun 20, 2014
Read this report from the Compliance, Governance and Oversight Council (CGOC) to learn how to reduce costs and increase performance by disposing digital debris.
Tags : ibm, information management, compliance, governance, cgoc, digital debris, cost reduction, information governance
     IBM
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Sungard Availability Services
By: Plex Systems     Published Date: Jun 06, 2014
Automotive metalformer, CCI, replaced 6 disparate systems with one single integrated ERP from the Plex Manufacturing Cloud, leading to operational efficiencies , immediate ROI, access to real-time data and a highly preventative maintenance schedule.
Tags : plex systems, automotive, metal former, roi, cloud, manufacturing
     Plex Systems
By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad
     McAfee
By: McAfee     Published Date: May 19, 2014
Este libro proporciona una visión general de la seguridad de la red y explica cómo los ciberdelincuentes pueden utilizar métodos ocultos o actualmente no detectables para acceder a los sistemas de red protegidos. Las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques) eluden las soluciones comunes actuales de seguridad de red. Pueden transportar cualquier ataque o exploración a través de dispositivos de seguridad de red y firewalls, firewall de próxima generación, detección de intrusos y sistemas de prevención e incluso enrutadores que realizan la inspección profunda de paquetes. En este libro encontrará todo sobre AETs y obtendrá consejos útiles y recomendaciones para ayudarlo a proteger su organización. Si trabaja en el gobierno, el área militar, banca, industria, comercio electrónico o con otras infraestructuras críticas, lea este libro para descubrir lo que se enfrenta y cómo protegerse mejor contra las evasiones avanzadas.
Tags : firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti
     McAfee
By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
     McAfee
By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
     Entrust Datacard
By: Oracle Social Cloud     Published Date: May 02, 2014
This white paper sets out to make the case that ROI determination can be approached in a unified, structured and straightforward way. It also lays out a framework for expanding the definition of ROI and increasing organizational maturity for measurement and monetization. Finally, it dispels some of the myths around ROI and seeks to show the relationship between social KPIs organizations may be collecting today and how to align them with broader organizational and business-oriented goals and objectives.
Tags : oracle, oracle srm, srm, social media, roi social kpis, emerging marketing, internet marketing
     Oracle Social Cloud
By: ServiceMax     Published Date: May 01, 2014
Watch this short video for more insights on how McKinley drastically improved customer service with solutions from ServiceMax.
Tags : service management software, field service management software, field service software, service software, field service management, work order management, dispatch software, service scheduling software
     ServiceMax
By: Oracle     Published Date: Apr 29, 2014
Many enterprises contend with fragmented systems and processes. Mergers and acquisitions have increased the number of organizations with disparate systems and business units. Download this white paper to learn how to achieve and integrated accounting platform.
Tags : oracle, accounting platform, mergers and acquisitions, disparate systems, fragmented accounting
     Oracle
By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : sans, siem, information and event correlation, critical security controls, reporting, security
     McAfee
By: Cisco     Published Date: Apr 14, 2014
Today's IT departments are increasingly challenged by the complexity of managing disparate components within their data centers. Rapidly proliferating silos of server, storage, and networking resources combined with numerous management tools and operational processes have led to crippling inefficiencies and costs.
Tags : cisco, sap, flexpod, data centers
     Cisco
By: ServiceMax     Published Date: Apr 14, 2014
A step-by-step look at how leading service organizations are automating systems with end-to-end visibility and integration.
Tags : service management software, field service management software, field service software, service software, field service management, work order management, dispatch software, service scheduling software
     ServiceMax
By: ServiceMax     Published Date: Apr 14, 2014
Discover how to magnify your field service tactical plan so you keep insanely happy customers and higher revenues well within sight.
Tags : service management software, field service management software, field service software, service software, field service management, work order management, dispatch software, service scheduling software
     ServiceMax
By: Cisco     Published Date: Apr 08, 2014
Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.
Tags : cisco, malware detection, malware threats, security, cloud computing, swg vendors
     Cisco
By: Quantcast     Published Date: Apr 07, 2014
The world of display advertising is being flipped upside down and yes, this is a very good thing. eMarketer predicts that display advertising will overtake search by 2015.
Tags : display advertising, search marketing, real time bidding, quantcast, interactive marketing
     Quantcast
By: Quantcast     Published Date: Apr 07, 2014
Listen to Quantcast and WebMetro discuss the challenges in understanding the effectiveness of online display advertising and how to focus on the metrics that matter.
Tags : display advertising, attribution, quantcast, prospecting, clicks, conversion, last touch, real-time bidding
     Quantcast
By: Turn     Published Date: Mar 27, 2014
Download this report to learn about the Digital Elite, the world's most valuable audience.
Tags : turn, marketing, global marketing, global digital audience, cross-channel brand, social networking, consumer engagement, roi
     Turn
By: Turn     Published Date: Mar 27, 2014
Download this report to learn more about where and when to find the Digital Elite.
Tags : turn, marketing, global marketing, global audience, global digital audience, cross-channel brand, social networking, consumer engagement
     Turn
By: Turn     Published Date: Mar 27, 2014
Forrester Calculates the ROI of Turn.
Tags : turn, forrester, economic impact, roi, turn audience suite, turn campaign suite, digital media services, revenue growth
     Turn
By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs
     Globalscape
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics