all media

Results 101 - 125 of 351Sort Results By: Published Date | Title | Company Name
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Achieving a 360-degree view of customers has become increasingly challenging as companies embrace omni-channel strategies, engaging customers across websites, mobile, call centers, social media, physical sites, and beyond. Learn how software solutions in AWS Marketplace can automate data lake analysis, enabling self-service platforms for analysis that expand and enhance personalization while deepening customer understanding so you can spend more time acting on insights.
Tags : 
    
AWS - ROI DNA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
Published By: G/O Digital     Published Date: Nov 13, 2014
For the majority of small businesses around the country, the world of marketing looks very different from big brands and retailers. With limited budgets, resources and staff to execute their marketing visions, it can oftentimes be daunting and confusing for local/ small businesses to tackle their social media marketing, let alone convert engagement with their content on social media sites like Facebook and Twitter into local store sales. Download this research report to learn how Facebook advertising converts digital ‘hunters’ into in-store buyers.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design, enterprise applications
    
G/O Digital
Published By: Oracle     Published Date: Jan 07, 2014
A description and analysis of Facebook Social Graph, monetization opportunities and its value to businesses.
Tags : 
socially enabled enterprise, social business, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience, facebook marketing, customer insight, knowledge management
    
Oracle
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA
Published By: Stratasys     Published Date: Sep 11, 2019
FDM (Fused Deposition Modeling) provides a fast and accurate method of producing jigs and fixtures. FDM is an additive manufacturing process that builds plastic parts layer-by-layer using data from computer-aided design (CAD) files. By using FDM, the traditional fabrication process is substantially simplified; tool-making becomes less expensive and time consuming. As a result, manufacturers realize immediate improvements in productivity, efficiency and quality. Find out how the Oreck Corporation, a well-respected manufacturer of vacuum cleaners and other cleaning appliances, realized immediate savings in cost, production time and inspection time by implementing FDM for its fixtures.
Tags : 
    
Stratasys
Published By: Adobe     Published Date: Nov 16, 2016
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: - Spend less time on processes and more time on creating experiences - Keep pace with every channel, including social media - Scale creative production to meet the demands of enterprise
Tags : 
adobe, stock, stock image, creative, design
    
Adobe
Published By: Adobe     Published Date: Jan 26, 2017
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: - Spend less time on processes and more time on creating experiences - Keep pace with every channel, including social media - Scale creative production to meet the demands of enterprise
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2017
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: • Spend less time on processes and more time on creating experiences • Keep pace with every channel, including social media • Scale creative production to meet the demands of enterprise
Tags : 
creative assistance, graphic design, photo editing, creative cloud, design, creative design
    
Adobe
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
    
VMware AirWatch
Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron
Published By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates don’t undermine the very user experience that we’re working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
    
Tricentis
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Moreover Technologies     Published Date: Mar 10, 2011
Learn all about the Web's most far-reaching and time-tested global news and social media aggregator. It's only one quick form and a mouse click away.
Tags : 
demo, social media, enterprise, software, free solution
    
Moreover Technologies
Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action, knowledge management, enterprise applications, data management
    
Advizex
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, marketing analytics, marketing data, crm, customer relationship management, web service management, infrastructure
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, social media marketing, ibm, unica, crm, customer relationship management, top-line marketing strategy, mass-marketing strategy, business intelligence, infrastructure
    
IBM
Published By: Unica     Published Date: Sep 08, 2010
Good marketers are going where their customers are - that means social media. According to a recent Unica global survey of marketers, 47% of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58%. Yet, for all the rush, many marketers are wondering, "where's the gold?" Download the white paper, "From Social Media Hype to Social Media Marketing" and learn how to build a stronger customer relationship."
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, customer relationships, social media, crm
    
Unica
Published By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print, mobile, call center, social media, website, integrated multichannel experience, cross-channel strategies, synergy, buy online, immediacy, convenience, cost savings, aisle kiosks
    
hybris software
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity, loyalty
    
Informatica
Published By: Genesys     Published Date: Oct 16, 2013
Earlier this year, Gartner released the 2013 Magic Quadrant for Call Center Infrastructure, an annual report that analyzes call center infrastructure vendors for completeness of vision and ability to execute. Explore and compare contact center solutions from today's top vendors and decide which solution is right for you. This is the fifth consecutive year that Genesys has been named a worldwide Leader for Contact Center Infrastructure. The Genesys Customer Engagement platform (referred to as the Customer Interaction Management or ‘CIM’ platform in the report), is the industry’s most complete platform on which companies can deploy an all-in-one, end-to-end scalable contact center Get the 2013 Gartner Magic Quadrant for Contact Center Infrastructure now!
Tags : 
contact centers, business value, functions, applications, inbound, outbound calling, social media analytics, integration tools, mobile crm tools, gartner magic quadrant, technology, enterprise applications
    
Genesys
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
Published By: ServiceNow     Published Date: May 14, 2019
In this report Gartner provides recommendations to address the key challenges I&O leaders are facing such as the inability to identify and remediate issues quickly, lack of insights to connect increasing volumes of data, and executive level sponsorship in tool replacement and consolidation.
Tags : 
servicenow, operations, gartner, report, insights
    
ServiceNow
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.