RSS feed Get our RSS feed

News by Topic

asp

Results 326 - 350 of 510Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : mobile management, system solutions, data security, software management, personal data management, device management
     IBM
By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
     Kaspersky
By: Oracle     Published Date: Oct 17, 2016
Change can impact any aspect of business, from daily operations to processes that develop and transport products and services to relationships with customers to sales and profitability, and any size of business, from large enterprises to midsize and smaller companies.
Tags : 
     Oracle
By: Datastax     Published Date: Aug 07, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
     Datastax
By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : aprimo, marketing process, financial control, digital asset management, data management
     Aprimo, Inc.
By: Silverpop     Published Date: Mar 07, 2013
It seems as if mobile email has become the new hot topic among digital marketers. While email itself is full of important questions to as, this is only one aspect of an effective multi-screen email marketing strategy. Watch this video to learn more.
Tags : mobile email, mobile email marketing, digital marketing, email marketing strategy, emerging marketing
     Silverpop
By: OutSystems     Published Date: Oct 12, 2015
This guide will help you grasp the vast and growing landscape of point solutions that exist to accelerate mobile app dev. A functional matrix will help you navigate the app lifecycle and better understand the challenges each tool addresses.
Tags : outsystems, mobile app, application development, app lifecycle, operating system
     OutSystems
By: Gigya     Published Date: Jun 08, 2015
Download this guide to get a grasp of the latest trends in user data management.
Tags : user data management, big data, identity and access management, compliance, mobilizing identity data
     Gigya
By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : kaspersky, cybercrime, hackers, malware, threat protection
     Kaspersky
By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aspect Software     Published Date: Nov 06, 2014
Learn how Trupanion reduced ongoing IT costs while increasing staff utilization, sales and customer satisfaction. This case study and research conducted by Nucleus Research outlines how Trupanion, using Aspect’s hosted contact center, achieved a payback in five months and an average annual benefit that exceeds $1.3M.
Tags : aspect, trupanion, roi, return on investment, it costs, strategy, visibility, customer satisfaction
     Aspect Software
By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
     CA Technologies
By: Oracle     Published Date: Nov 25, 2016
Digital disruption impacts every aspect of modern business. Access to peer opinion, knowledge, and self-service capabilities, from almost anywhere and from almost any device, has hugely transformed the way we run our businesses and lead our lives.
Tags : 
     Oracle
By: Oracle     Published Date: Nov 25, 2016
Digital disruption impacts every aspect of modern business. Access to peer opinion, knowledge, and self-service capabilities, from almost anywhere and from almost any device, has hugely transformed the way we run our businesses and lead our lives.
Tags : 
     Oracle
By: Oracle     Published Date: Nov 15, 2016
Digital disruption impacts every aspect of modern business. Access to peer opinion, knowledge, and self-service capabilities, from almost anywhere and from almost any device, has hugely transformed the way we run our businesses and lead our lives.
Tags : 
     Oracle
By: Quocirca     Published Date: Apr 23, 2007
Many independent software vendors (ISVs) are recognising the benefits of offering software as a service (SaaS) as an alternative for their customers and once the teething problems have been overcome there are a number of long term benefits for both parties.
Tags : isv, isvs, saas, software as a service, business model, software service, aspiren, independent software vendor
     Quocirca
By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
     Kaspersky
By: Netviewer     Published Date: Jul 10, 2009
Business travel is coming under closer scrutiny: In Germany alone, companies spend approximately 50 billion euros on business travel every year. To partially offset this expense, many companies are replacing business trips with online meetings. With this technology, customers and partners are able to communicate with images and audio over the Internet, while special presentation functions reinforce the personal aspects of a meeting. Software licenses, Webcams, and headsets are worth the investments. Companies that use Web meetings discover new methods of collaboration and reduce their own output of greenhouse gases.
Tags : netviewer, vdr, german travel management, online meetings, roi, business travel, greener, webcams
     Netviewer
By: Oracle Corporation     Published Date: May 11, 2012
Download this whitepaper for a summary of the complete and integrated aspect of Oracle's strategy and where OBIEE 11g, the Oracle database, and the Oracle Exadata Database Machine have several key integration points.
Tags : oracle, business intelligence, database, exadata, integration, machine, integrate, performance
     Oracle Corporation
By: HP     Published Date: Oct 01, 2014
The role and purpose of IT in an organization is undergoing significant change, driven by the need for businesses to become more agile and have greater control over cost levers when using technology. This transformation of IT involves many different aspects, not all of which are technology-related, but the one thing they all share is that IT modernization is about making changes to meet the current and future demands of business. This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective, with the findings delivered as the Ovum Decision Matrix (ODM). It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled.
Tags : decision, matrix, virtualization, cloud, management, businesses, technology, modernization
     HP
By: Webroot     Published Date: Sep 18, 2013
In today’s challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing. PassMark Software is a leading authority in software and hardware performance benchmarking, providing independent testing and analysis. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics—from performance to malware protection—to help you determine which would work best in your organization
Tags : security, benchmark, software, hardware, endpoint security, performance metrics, protection
     Webroot
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Corporations today are focused on employee engagement – but the task of keeping employees engaged is not that easy. Recent research shows that 38 percent of the respondents to PwC’s Annual CEO Survey see effective performance management as a critical factor when they were asked “what aspects of their talent strategy would make the greatest impact on attracting, retaining and engaging the people you need to remain relevant and competitive.”1 Achieving simultaneous growth in top-line revenue and bottom-line profitability has come, and likely will continue to come, through greater levels of workforce efficiency.
Tags : cloud, cloud computing, performance management, survey, employee engagement, efficiency
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: CSB by Cornerstone on Demand     Published Date: Aug 10, 2012
When all my good work and planning has been undone, I like to visit pinterest, where I've built a utopian world filled with "when I grow up" aspirations.
Tags : performance management, sonar6, pinterest
     CSB by Cornerstone on Demand
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics