RSS feed Get our RSS feed

News by Topic

trade

Results 251 - 275 of 373Sort Results By: Published Date | Title | Company Name
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : network security, access control, nac, network access control, intrusion prevention, landesk
     LANDesk
By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI built a transaction monitoring cognitive data lake to facilitate AML transaction monitoring across post trade transactions for a leading global bank, which resulted in reduction of human errors by 30% and TAT improvement by 50%. Download Complete Case Study.
Tags : 
     Larsen & Toubro Infotech(LTI)
By: LeadLife Solutions     Published Date: Oct 20, 2008
If your sales team loves your ABC lead-ranking system because it really works, good for you. However, if your Hot-Warm-Whatever system is leaving the sales team cold, there is a better way. A robust database and campaign management application helps marketing score every interaction by every lead, online and offline, and prioritize leads automatically for appropriate next steps...
Tags : leadlife solutions, e-newsletter, blog, telemarketing, trade show, direct mail, webinar, lead generation & automation
     LeadLife Solutions
By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of applications and file needs. As the world moves to the web and to the cloud, agencies are asking whether VDI is still a good fit for emerging mobility and BYOD needs. See this important infographic to learn more about the tradeoffs between VDI and emerging cloud technologies, and what you can do to take advantage of new solutions to drive improved mobile productivity across your entire organization.
Tags : vid, cloud alternatives, emerging mobility, mobile productivity
     Lenovo
By: Lenovo     Published Date: Sep 16, 2014
Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, isn’t it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services can be most compatible, agencies can take a smarter approach to these difficult decisions. See the tradeoffs in plain English, and learn why more agencies are taking notice to emerging cloud technologies through this exclusive executive summary.
Tags : vdi, cloud alternatives, byod demands, emerging web technologies
     Lenovo
By: Lenovo     Published Date: Aug 31, 2018
You shouldn't have to trade one for the other. We'll show you where organizations typically make compromises for mobility, to help you avoid the trade-off pitfall and select the best devices for your mobile organization: • Insist on uncompromising productivity • Demand 360° security • Choose reliable durability first Lenovo is the first, best and most innovative leader in building devices to support your mobile workforce.
Tags : 
     Lenovo
By: Lenovo and Intel®     Published Date: Aug 09, 2018
Organizations around the world are clamoring for the kind of scale, automation and agility delivered by Lenovo ThinkAgile hyperconverged infrastructure (HCI), powered by the Intel® Xeon® Platinum processor. Hear from Eric Sheppard, Research Director for Storage at IDC, how the move from converged infrastructure to hyperconverged systems is reaching market maturity and gaining traction in enterprise IT. Read an expert’s opinion on what’s next for HCI plus recommendations for organizations who haven’t yet benefited this exciting technology. Download now.
Tags : intel, the intel logo, xeon
     Lenovo and Intel®
By: Lenovo UK     Published Date: Oct 15, 2018
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
     Lenovo UK
By: Lenovo UK     Published Date: Nov 08, 2018
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
     Lenovo UK
By: LockLizard     Published Date: Dec 08, 2008
This white paper describes the differences between information, IPR and trade secrets, and where these might apply. 
Tags : ipr/drm protection, locklizard, drm controls, digital rights management, security
     LockLizard
By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : data, breaches, organizations, global
     LogRhythm
By: Lucidworks     Published Date: Dec 14, 2016
Download this whitepaper to learn about the benefits and trade-offs of contextual and data-based analysis. Recommendations and answers are provided by the next generation of enterprise applications that use search-based features and capabilities to improve performance and add value.
Tags : 
     Lucidworks
By: Lyris, Inc.     Published Date: Jul 01, 2011
Maximize your email marketing campaigns and improve ROI- let the "25 Essentials for Exceptional Email Campaigns" be your guide to the essential rules of email engagement, with fundamental best practices that will help you get the most from your email marketing efforts.
Tags : lyris™, email marketing services, marketing software, email value proposition, evp, email marketing software, email campaigns, sender reputation
     Lyris, Inc.
By: MarkLogic     Published Date: Aug 31, 2017
With MiFID II regulations demanding increased pre and post-trade transparency for consumers, investment banks are in a race against the clock to demonstrate compliance across a dizzying array of data sources, systems and schemas before January 2018.
Tags : 
     MarkLogic
By: MB Assets     Published Date: Jan 24, 2011
Private Placement Programs and Trade Platforms; What They Really Are
Tags : private placement programs, trade platforms, trade programs, ppp, high yield investment program, hyip
     MB Assets
By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : network performance, security trade-off, security, firewalls, mcafee, internet security
     McAfee
By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : network performance, security trade-off, security, firewalls, mcafee, internet security
     McAfee
By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : network performance, security trade-off, security, firewalls, mcafee, internet security
     McAfee
By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : network performance, security trade-off, security, firewalls, mcafee, internet security
     McAfee
By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information
     McAfee
By: McAfee     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.
Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw
     McAfee
By: McAfee     Published Date: Jan 20, 2015
CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.
Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics