RSS feed Get our RSS feed

News by Topic

act

Results 126 - 150 of 13980Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbedģ Cascadeģ gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
     Riverbed
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and e ectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
     BlackBerry Cylance
By: Nuesoft     Published Date: Jan 30, 2013
Download this whitepaper to view 10 simple steps to ensure you find the perfect practice management system that's right for your office.
Tags : practice, management system, solution, priorities, integrated practice
     Nuesoft
By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : m86 security, data loss prevention, email, web gateway best practices, dlp policy
     M86 Security
By: M86 Security     Published Date: Feb 09, 2011
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : m86 security, data loss prevention, email, web gateway best practices, dlp policy
     M86 Security
By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: ē Analyzing your current processes and identifying your needs ē Mapping out the various processes and training requirements ē Calculating the financial impact of training ē Making the case and managing the project
Tags : learning solution, business case, lms, development, learning management strategy
     Skillsoft
By: Xero     Published Date: Feb 18, 2014
You're mobile and streamlined -- or trying to be both those things -- while you provide salient financial advice to your clients, who are mostly small businesses like you. As your job is moving from traditional accounting work to involve a lot of business growth and marketing.
Tags : online accounting, marketing, small business, smb, finances, cloud, cloud computing, mobile marketing
     Xero
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management
     Tripwire
By: Rackspace     Published Date: Mar 26, 2019
For enterprises migrating to the cloud, the technology shift they face would be their most significant of the decade Ė and the journey will require a lot more from them than following a few best practices. The success of their first cloud project hinges on having the right experience, tools and processes to execute the move, in a rethinking of their culture and operation from different technology perspective. Hence, they would find the 10 steps outlined in this e-book to be a valuable reference, in helping them align thoughts and approaches for cloud adoption success.
Tags : 
     Rackspace
By: eMC     Published Date: Oct 11, 2010
Learn 10 practical tips on how to make your email messages stand out among the clutter and maximize your results with this FREE white paper!
Tags : napco, emc, email marketing, emarketing, roi, list management, newsletter design, email marketing services/software
     eMC
By: Sitecore EMEA     Published Date: Jan 23, 2018
Anything you do is an opportunity to learn and get better in creating the right experiences for your visitors, which is why you should always be testing. Testing is well proven and will help you increase revenues. There are many elements you should be testing, and as you get more confident with testing, there are different levels of how you should be testingófrom simple A/B to multivariant testing.
Tags : tactics, optimizing, commerce, sitecore
     Sitecore EMEA
By: Germain Software     Published Date: Mar 10, 2011
Provides 10 tips to proactively tune Siebel CRM software and the infrastructure Siebel CRM is deployed on
Tags : siebel performance tuning
     Germain Software
By: Act-On     Published Date: Jul 08, 2015
To help you navigate your way through LinkedIn, weíve put together 10 things you should be doing today to make the most of LinkedIn.
Tags : b2b, social media, marketing strategy, guide, marketing software, web analytics, social media marketing
     Act-On
By: Act-On     Published Date: Oct 09, 2015
LinkedIn has evolved into a powerful lead generation tool for many businesses. Its features, like Publisher and Groups, lend themselves well to connecting businesses with prospects. With so many great features, it can be quite challenging to figure out how to use the ones that best fit your needs. To help you navigate your way through LinkedIn, weíve put together 10 things you should be doing today to make the most of LinkedIn.
Tags : reachmail, linkedin, b2b best practices on linkedin, b2b companies, search marketing, emerging marketing, social media, internet marketing
     Act-On
By: Act-On     Published Date: Jul 08, 2015
This eBook will walk you through some best practices and tips for using Twitter for business.
Tags : social media, hashtag, marketing, strategy, best practices, guide, interactive marketing, marketing software
     Act-On
By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; itís the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : store, locator, experience, optimize, local marketing, customer journey
     Uberall
By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; itís the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : locator, uberall, store locator, location marketing, local listings
     Uberall
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
     SunGard Availability Services
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions
     LockLizard
By: AppDynamics     Published Date: Apr 11, 2017
This white paper reveals the top 10 practices around DevOps your CIO and team need to know about to adopt the best model for success.
Tags : devops, infrastructure, cio
     AppDynamics
By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : firewall, palo alto, security, network security, safe applications, cyber threats
     Palo Alto Networks
By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
     Lumesse
By: Silverpop     Published Date: Jun 15, 2012
Driving traffic to the company website is a primary goal for many marketers, but what do you do when visitors leave without converting? Learn how retargeting can help keep your brand top of mind, entice contacts to return and take action, and increase revenue.
Tags : marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns, retargeting, online
     Silverpop
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics