aso

Results 1026 - 1050 of 1185Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Nov 30, 2015
Presto è Natale, doni per tutti:per brutti e belli. Ma attenti ai monelli...
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Independientemente de que se trate de una persona o una empresa, usted se debe encargar de la seguridad online de la misma manera en que se encarga de la seguridad física en su hogar o su empresa. No solo le hará sentir más seguro, sino que además protege a las personas que visitan su hogar, el lugar de trabajo oel sitio web. Es importante comprender los riesgos potenciales y asegurarse deestar totalmente protegido contra ellos. En el vertiginoso mundo de la tecnología, no siempre es sencillo mantenerse al día con los avances más recientes. Por este motivo, es aconsejable asociarse con una empresa de seguridad en Internet de buena reputación.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Christmas is coming, the goose is getting fat; Don’t give hackers a welcome mat.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
International tätigen nur noch sieben Prozent1 der Verbraucher alle Weihnachtseinkäufe im traditionellen Einzelhandel. Neun von zehn Deutschen nutzen das Internet für einen Teil ihrer Weihnachts­einkäufe, jeder Dritte kauft sogar die Mehrheit seiner Geschenke dort.2 Das bedeutet, dass nur die wenigsten Händler noch auf den OnlineHandel verzichten können. Ob Gutscheine, Bestellungen zur Abholung in einer Filiale oder der inzwischen beinahe „klassische“ OnlineEinkauf: Ihre Kunden sind bereit, Ihren virtuellen Gabentisch reich mit Daten und Absatzchancen zu decken. Doch wer die WebsiteSicherheit vernachlässigt, muss stattdessen die Rute in Form von Hackerangriffen und verärgerten Kunden fürchten.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Christmas is coming, the goose is getting fat; Don’t give hackers a welcome mat.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
O Natal está chegando; não facilite a vida dos hackers
Tags : 
    
Symantec
Published By: Wheelhouse Enterprises     Published Date: Apr 15, 2009
Quickly see differences between brands like Avaya, Mitel, Cisco, ShoreTel, 8x8, Panasonic, etc and compare over 94 phone systems by 52 brands for small to big business. Our latest Spring 2010 edition of the chart also compares PBX and Business VoIP systems side by side so you can make an educated comparison of your options. This analysis is prepared in an easy to use Excel spreadsheet so you can edit and add information to suit your analysis and presentation needs.
Tags : 
compare, compare business products, wheelhouse, avaya, mitel, cisco, shoretel, 8x8, voip, pbx, infrastructure, ip networks, ip telephony
    
Wheelhouse Enterprises
Published By: VeriSign     Published Date: Jul 12, 2010
This Essential Series eBook examines the seven reasons customers do business online and offline; discuss how to use that customer's decision-making to build a trustworthy web site; and gives guidance on making a good web site great by adding professionalism and reputation-enhancing visual cues.
Tags : 
verisign, online retail, seo, trustworthy, customer confidence, security, ecommerce, shoppers, online purchasing
    
VeriSign
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec
Published By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : 
third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
    
NAVEX Global
Published By: IBM     Published Date: Feb 18, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile app testing, ibm, desktop applications, mobile test environments, mobile device cloud, it management, knowledge management, enterprise applications, business intelligence
    
IBM
Published By: Crownpeak     Published Date: Feb 12, 2015
Download this guide to learn some of the reasons that new website projects take so long to launch, and the 5 ways to speed them up.
Tags : 
crownpeak, website, website launches, website development, digital marketing, internet marketing, website initiatives
    
Crownpeak
Published By: Crownpeak     Published Date: Sep 08, 2015
The Race to Personalization - 5 Data-Backed Reasons Personalization Needs to Be Part of Your Marketing Strategy!
Tags : 
crownpeak, web content management, web experience management, personalization, marketing, content marketing, content personalization, roi, web experience, customer experience
    
Crownpeak
Published By: Xactly Corp     Published Date: Nov 16, 2016
Sales Compensation planning season is right around the corner, and there’s no better time than now to start preparing! Join compensation expert Robert Blohm, Xactly’s VP of Strategic Services, for an on-demand webinar which will share industry best practices regarding preparation efforts to help ensure you are ready. We’ll cover everything you need to do BEFORE you start designing. With the right preparation, your new plans will be grounded in reality and guided by the best thinking in your organization. Prepare to succeed.
Tags : 
comp planning, compensation planning, sales compensation planning, comp design, sales compensation, sales compensation software, incentive compensation software, sales commission, sales payout, sales technology, sales best practices, sales performance management, incentive compensation, compensation management, enterprise applications
    
Xactly Corp
Published By: AdRoll     Published Date: Aug 22, 2017
For most retailers, the holidays are a frenzied rush of juggling multiple campaigns, meeting revenue goals, and hitting lofty numbers before the year is up. It’s far from a relaxing time of year. The holiday season has become critically important to online retailers. With the rise of Black Friday, Small Business Saturday, Cyber Monday, Green Monday, Super Saturday, and Boxing Day, the definition of “the holidays” has expanded substantially. While these retail days have helped distribute the holiday rush across a wider range, they’ve also made holiday campaign planning far more complex. Expanding digital channels, such as mobile and social media, have added to the immense opportunities that the holidays provide. Just last year, mobile accounted for 50.3% of all e-commerce traffic, surpassed desktop traffic for the first time ever. Knowing this, it shouldn’t be a surprise that 38% of shoppers now say they will not return to a retailer’s website if it’s not mobile optimized.
Tags : 
holiday planning, retail, black friday, social media, mobile
    
AdRoll
Published By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, security, data management
    
Thawte
Published By: ForeSee Results     Published Date: Feb 05, 2007
Free shipping, undoubtedly, is necessary to compete in the critical holiday season. But, is it really a competitive advantage? Does it drive short-term sales and long-term loyalty? And, are free shipping offers equally effective for repeat customers as for those that buy from a retail site for the first time?  ForeSee Results found some interesting answers to these questions.
Tags : 
e-commerce software, loyalty and retention, free shipping, e-tailers, e-commerce, foresee, foresee results
    
ForeSee Results
Published By: Absolute Software     Published Date: Jan 02, 2013
The growing use of tablets, smartphones, and ultrabooks makes enpoint governance, risk management, and compliance (GRC) more challenging.
Tags : 
absolute software, grc strategy, adjust your endpoint, enpoint governance, security
    
Absolute Software
Published By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : 
intrusion prevention, wireless security, security policy, security policies, security management, governance, airtight, airtight networks, wireless, wide area networks, access control, authentication
    
AirTight Networks
Published By: IBM     Published Date: Dec 12, 2006
This case study outlines their success in achieving global simultaneous product launches, correct information for catalogs and advertising, faster price change notifications and better Point of Sale (POS) integration.
Tags : 
data integration, product lifecycle management, information management, sales & marketing software, collaboration, business management, catalogging, catalog, cataloging, product information management, ibm, enterprise applications, application integration, best practices, it spending, return on investment, records management
    
IBM
Published By: IBM     Published Date: May 30, 2008
People drive your business. Whether you are a customer, supplier, owner, or employee, it is cultivating and maintaining those people relationships within and beyond your company that determine how well you will fare in the marketplace. This is why IBM knows that it is important that you have ultimate choice and flexibility to work the way you want.
Tags : 
ibm, ep campaign, ibm ep, collaboration, relationship management, information management, desktop management, lotus notes, lotus, knowledge management
    
IBM
Published By: ICG Commerce     Published Date: Aug 21, 2009
This paper draws upon recent discussions with dozens of companies that are exploring outsourcing services. Jason Gilroy and colleagues draw upon their years of procurement expertise to provide answers to common questions surrounding the outsourcing of procurement services.
Tags : 
eprocurement, outsource, procurement outsourcing, outsource procurement, procurement, top 10, icg commerce, icg, software outsourcing
    
ICG Commerce
Published By: ICG Commerce     Published Date: Aug 21, 2009
This paper uncovers the elusive steps that many companies miss when implementing e-Procurement. Establishing a successful e-Procurement solution that will drive a measurable and compelling return on investment requires a comprehensive, results-focused approach.
Tags : 
eprocurement, procurement, e-procurement, return on investment, roi, project management, icg commerce, icg
    
ICG Commerce
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security, internet security systems, quality of service, voice recognition
    
Internet Security Systems
Start   Previous    34 35 36 37 38 39 40 41 42 43 44 45 46 47 48    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.