RSS feed Get our RSS feed

News by Topic

read

Results 401 - 425 of 5542Sort Results By: Published Date | Title | Company Name
By: Kapost     Published Date: Jan 16, 2014
Today, the internet has changed the way buyers discover solutions. More people are meeting and researching vendors online than ever before. Your ideal customers are reading blog posts and articles, checking Facebook, Twitter, and LinkedIn profiles, and forming opinions based on what you say and share online. Before they call to get to know your company better, they turn to Google for answers and information. If a competing vendor appears smarter, more interesting, or more reliable than you, your buyers will reach out to them first. These online engagements have changed the rules of buyer/brand communications. So how can you and your company form meaningful relationships with buyers who are getting to know you long before they’ve been introduced?
Tags : content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform
     Kapost
By: SilverPop     Published Date: Dec 30, 2010
Stay up-to-date on the latest in email marketing and learn what you can expect to see from email marketers in 2011. From growing trends in opt-in methods to a continued focus on retention and re-engagement, this white paper is sure to keep you current on everything email marketing. Download the white paper today!
Tags : silverpop, email marketing, multichannel, social marketing, facebook, twitter, isp, opt in
     SilverPop
By: Outreach.io     Published Date: Sep 17, 2019
The Navy SEALs — a highly skilled, extremely cohesive unit that can be deployed at a moment's notice to take on the toughest missions. The same tactics and training that make the SEALs so formidable and effective can be applied to your Sales Development team. In this guide, we will teach you how to take your best Sales Development Representatives (SDRs) and turn them into a highly actionable team of world-class prospectors, ready to do battle with the toughest of territories in the most efficient way possible. You'll learn: How to identify your standout SDRs and recruit them for special missions The best ways to measure, adjust and iterate your tactics with every evolution so you can book more qualified meetings and win more deals How to deploy your new SDR SEAL team to not only boost revenue, but to rescue struggling Account Executives
Tags : 
     Outreach.io
By: Interactive Intelligence     Published Date: Jul 21, 2010
Read why the CaaS offering from Interactive Intelligence delivers a positive ROI from the start.
Tags : interactive intelligence, communications as a service, caas, roi, software as a service, saas, telecom vendor, deployment
     Interactive Intelligence
By: Polycom     Published Date: Sep 15, 2015
Although formal meetings are not likely to go extinct in the near future, less formal, unscripted, impromptu “teaming sessions” will, and for many have already become, daily business.
Tags : team building, collaboration, conferencing, huddle, phone, polycom, skype, video
     Polycom
By: SAS     Published Date: Apr 25, 2017
But if you can’t explain how you got the answer, or what it means, it’s no good. Most self-service BI solutions can only display what has already happened, through reports or dashboards. And most have a predefined path of analysis that gives users very little creative freedom to explore new lines of thought. To maintain competitive advantage, your BI solution should allow business users to quickly and easily investigate and interrogate the data to find out why something happened – to uncover the root cause behind the “what.”
Tags : 
     SAS
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : enterprise, file sharing, collaboration, technology, market, security, new news
     Intralinks
By: SafeNet     Published Date: Jun 03, 2013
To learn more about the current state of the data braech epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : data breach, it security, data security, data protection
     SafeNet
By: Workday UK     Published Date: Apr 25, 2019
We know medium enterprises have limited resources. That’s why we've put together a plan to help guide you through priority initiatives when it comes to building out your HR Core strategy and how to apply it in to a system for scalability. Read now.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Workday     Published Date: Apr 30, 2019
We know medium enterprises have limited resources. That’s why we've put together a plan to help guide you through priority initiatives when it comes to building out your HR Core strategy and how to apply it in to a system for scalability. Read now.
Tags : workday, workforce technology, digital strategy
     Workday
By: Workday     Published Date: May 21, 2019
We know medium enterprises have limited resources. That’s why we've put together a plan to help guide you through priority initiatives when it comes to building out your HR Core strategy and how to apply it in to a system for scalability. Read now.
Tags : 
     Workday
By: IBM     Published Date: Jul 25, 2012
IBM PureSystems offers highly integrated solutions that can help you deploy and tune applications for cloud architectures with ease. Read the research report to take a deeper look at PureFlex Systems within the PureSystems family and learn how PureFlex Systems can help you streamline management and accelerate client time-to-value with a new integrated and modular system/subsystem.
Tags : technology, cloud computing, cloud architecture, storage, management, storage management, ibm puresystems, ibm
     IBM
By: Websense     Published Date: Aug 23, 2012
All DLP controls have two things in common.First, they provide the ability to identify: data-in-motion, data-in-use, data-at-rest. Read this whitepaper to find out more about DLP.
Tags : websense, data loss, prevention, dlp
     Websense
By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
     CA Technologies
By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
     Symantec
By: Citrix     Published Date: Feb 22, 2013
An enterprise cloud network is one that embodies the characteristics and capabilities that define public cloud services. These include being 'elastic' so that performance can be scaled and etc. Read on to learn more about Citrix Triscale Technology.
Tags : revolution in cloud networking, triscale technology, triscale technology, application management, capability management
     Citrix
By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
     CrowdStrike
By: Oracle     Published Date: Sep 21, 2016
The job of keeping business data safe has spread across the organization to become an enterprise wide concern. The critical question now—the one that’s being asked, not only by IT but also by CFOs—is “Whether it’s on-premises or in the cloud, how do you keep sensitive data secure?” Your cloud provider should be able to provide the right answers.
Tags : 
     Oracle
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Staples     Published Date: Jan 22, 2018
Genplex, a manufacturing business in rural Maine, sought to reduce its shipping costs without sacrificing quality of its shipments to customers. Staples Business Advantage accepted their challenge. Read about the solution and results.
Tags : 
     Staples
By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
     IBM
By: Workday UK     Published Date: Apr 25, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Workday UK     Published Date: Apr 25, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : 
     Workday UK
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics