ips

Results 326 - 350 of 1756Sort Results By: Published Date | Title | Company Name
Published By: Esker     Published Date: Jan 08, 2019
It seems like most vendors offer a single solution meant to appease every AR department … but that’s not what you need. You need a solution built for you — not for everybody. In this eBook, you’ll get tips for picking the perfect solution for your company to automate what needs automating in your AR department while: • Increasing visibility with real-time metrics & reporting • Boosting productivity by eliminating tedious tasks • Providing customers with a self-service portal
Tags : 
    
Esker
Published By: Gigya     Published Date: Jun 08, 2015
As channels fragment and consumer identities multiply, businesses are struggling to achieve a single customer view. This guide provides actionable strategies to achieve this “holy grail” to better understand your audience, build relevant experiences and grow customer relationships. Get tactics and examples to help you: Identify your customers across channels and devices Manage today's volume and variety of customer data Integrate and apply data across marketing campaigns Build more personalized customer journeys
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security
    
Gigya
Published By: HP     Published Date: Jul 22, 2010
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks.
Tags : 
network security, dns, botnet command and control (cnc), malware; phishing, hp tippingpoint, tippingpoint digital vaccine, tippingpoint n-platform ips, tippingpoint security management, ips platform, access switches, reputation database, security management system, network architecture, network management, ddos, internet security, ipsec, network security appliance
    
HP
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
Read this whitepaper and see why the shift toward self-service data analytics is empowering leading analysts and analytic teams to improve processes, eliminate repetitive tasks, build better relationships with IT, and deliver deeper insights faster.
Tags : 
    
Alteryx, Inc.
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm, knowledge management
    
IBM
Published By: Adobe     Published Date: Mar 03, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
media and entertainment, acquiring audience, retaining audiences, data-driven marketing, engagement obstacles, data management
    
Adobe
Published By: Adobe     Published Date: May 16, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
    
Adobe
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense", security, it management
    
McAfee
Published By: Verio Inc.     Published Date: Oct 15, 2010
Download this guide for videos and demonstrations to help grow your business. Get tips for adding value for customers with easy-to-install applications that provide the functionality they are looking for, without the headaches of setup or investment on your end.
Tags : 
verio, ecommerce, whm, vps, hosting, cpanel, vps
    
Verio Inc.
Published By: Lyft     Published Date: May 06, 2016
Business travelers in the U.S. will take close to 500 million trips in 2016. That means, every day, nearly 40,000 people are booking ground transportation¹. Meanwhile, a stream of devices and applications are emerging to help travelers get to their destinations in more efficient, safe, and affordable ways. This constantly-changing landscape can leave your team lost, fighting other business travelers for space and trying to keep up with the best apps. And lost is the last place your team should be, especially when they’re traveling for work.
Tags : 
best practices, business optimization, business management, mobile, transportation
    
Lyft
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management, encryption, security management, content management system
    
IBM
Published By: Adobe     Published Date: Apr 30, 2015
Learn the advantages of triggered and retargeted emails, and get real-world insights into smart email marketing from C Spire Wireless and others.
Tags : 
email marketing, real world insights, roi, customer lifecycle, customer relationships, mobile devices
    
Adobe
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips, security, it management
    
McAfee
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Gradient Boosting Machine (GBM) modeling is a powerful machine learning technique for advanced root cause analysis in manufacturing. It will uncover problems that would be missed by regression-based statistical modelling techniques and single tree methods, but can easily be used by analysts with no expertise in statistics and modelling to solve complex problems. It is an excellent choice for advanced equipment commonality analysis and will detect interactions between process factors (for example, machines, recipes, process dates) that are responsible for bad product. It can also be used to identify complex nonlinear relationships and interactions between product quality measurements (for example, yield, defects, field returns) and upstream measurements from the product, process, equipment, component, material, or environment.
Tags : 
    
TIBCO Software GmbH
Published By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : 
fireeye, cyber attacks, firewalls, ips, protect, security
    
FireEye
Published By: SAS     Published Date: Apr 04, 2018
Location analytics is the process of integrating geographical data into business intelligence (BI) and analytics-led decision making. Location analytics creates meaningful insight from relationships found in geospatial data to solve a broad variety of business and social problems. Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Hardworking, passionate, and tech-literate — by 2020, more than half of your employees will be from the often-misunderstood “Millennial” generation. However, many millennials hold a different benchmark of expectations from their place of work than previous generations. Download this e-Book to prepare your business. Here’s a list of five expert tips to attracting and retaining the best young talent available, such as: Understanding “work-life balance” beyond the buzzwords Prioritizing professional development for this passionate demographic Satisfying a net-native’s need for tech tools that actually wor
Tags : 
millennials, work-life balance, professional development, tech tools, business management
    
Citrix ShareFile
Published By: AdRoll     Published Date: Oct 05, 2016
AdRoll sat down with some of Australia’s leading media agencies for a detailed conversation about their approach to attribution. From that discussion, AdRoll compiled the top 10 tips those agencies would like to impart about attribution modelling. Download to learn more!
Tags : 
attribution, attribution modelling, advertising agency
    
AdRoll
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Allbound     Published Date: Jan 13, 2016
In this ebook, you’ll learn how businesses are using technology and the cloud to transform their channel ecosystems into a model of collaboration and empowerment, injecting purpose and engagement into partner relationships, and building a channel-wide culture of customer success for both manufacturers and their resellers.
Tags : 
channel marketing, sales acceleration, customer success, collaboration, content
    
Allbound
Published By: NetApp APAC     Published Date: Jul 04, 2019
With the introduction of enterprise-grade all-flash arrays, conventional thinking about storage has been turned on its head. For example, a recent Gartner study found that all-flash storage pays for itself in just five to six months on average, the result of dramatic improvements in total cost of ownership (TCO).
Tags : 
    
NetApp APAC
Published By: NetApp     Published Date: Dec 05, 2016
"All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all-flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale-out solutions have emerged that are designed to power the new cloud services of the future. The book examines various elements of all-flash storage: how it evolved, and why you should now consider it for all of your primary applications. You get acquainted with the NetApp portfolio of all-flash storage solutions and learn how each is designed to meet the needs of a specific type of application environment. You’ll also learn five strategies for making smart decisions about all-flash arrays for your next storage project. In that classic Dummies style, you’ll walk away with useful tips on how to select and deploy all-flash
Tags : 
netapp, database performance, flash storage, storage for dummies, data management, cost challenges
    
NetApp
Published By: AWS     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
AWS
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
Amazon Web Services
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.