profile

Results 176 - 200 of 299Sort Results By: Published Date | Title | Company Name
Published By: Polycom Inc.     Published Date: Oct 14, 2010
Learn what sets Polycom apart and find out how you can take advantage of these benefits.
Tags : 
polycom, h.264 high profile, roi, video conferencing, ip networks, ip telephony, return on investment, voice recognition, voice over ip
    
Polycom Inc.
Published By: Oracle     Published Date: Feb 10, 2016
In every company, today's ideas determine tomorrow's market profile. With rising competition, success can be achieved through a well-defined innovation process--one that connects upstream idea valuation to downstream production and release-to-market. To accomplish this, companies need to take a holistic approach to innovation management, connecting the process throughout all phases of the innovation lifecycle.
Tags : 
oracle, innovation management, best practices, holistic process, innovation process, innovation lifecycle, it management, wireless, data management
    
Oracle
Published By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen
    
Unica
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 29, 2010
VMware sites create more storage to manage and protect than their physical counterparts. This report showcases how EMC Backup and Recovery Solutions for VMware have helped customers redesign their backup operations.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, storage virtualization, server virtualization, data center design and management
    
EMC Backup & Recovery Solutions
Published By: EMC Backup & Recovery Solutions     Published Date: Aug 27, 2009
Data profile assessments will let us help you determine the best match for your situation, the data you are looking to protect, your service level agreements, and the specifics of your current challenges and environment.
Tags : 
emc, data domain, efficiency, api, disk backup, recovery, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, backup and recovery, storage area networks
    
EMC Backup & Recovery Solutions
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 22, 2010
In this Solution Profile, we will concentrate on the importance of optimizing data protection for evolving virtual networks, and on working with a trusted partner. Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility. However, virtualization also requires that companies adapt their traditional backup and data protection practices to suit the rapidly changing virtualization infrastructure.
Tags : 
emc, vmware, taneja, virtual environments, virtualization, backup, data protection, infrastructure, server hardware, servers, data center design and management
    
EMC Backup & Recovery Solutions
Published By: HP and Intel® Xeon® processors     Published Date: Oct 04, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : 
blade servers, datacenter, agility, intel, servers, data center
    
HP and Intel® Xeon® processors
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: Qualys     Published Date: Jun 30, 2016
Few would argue with the statement that security is a top priority for IT departments at companies large and small today. Data is the currency of the digital age and the lifeblood of organizations, so strategies to protect corporate data are growing in importance and are now a topic of C-suite consideration. So with high-profile data breaches continuing to occur across industries, security leaders are revamping their strategies to keep pace.
Tags : 
security, cloud, cloud management, data security, it management
    
Qualys
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony, best practices, customer interaction service, customer relationship management, corporate portals
    
Cymfony
Published By: VM Ware     Published Date: Nov 04, 2009
This Taneja Group Solution Profile identifies the data protection optimizations available in the VMware vSphere environment.
Tags : 
vmware, data protection, vsphere, server virtualization, smb, disaster recovery
    
VM Ware
Published By: Silver Peak     Published Date: Feb 12, 2013
An optimized WAN environment can increase network reliability and availability and improve cost profiles. It also improves the performance and reliability of data backup, replication, and recovery processes.
Tags : 
virtualization, wan, optimization, data center, network, reliability, high availability, business continuity, application integration, cloud computing, infrastructure
    
Silver Peak
Published By: ClearSlide, Inc     Published Date: Nov 06, 2013
This Clearslide-commissioned profile of US enterprise sales leaders evaluates the current adoption trends surrounding sales engagement platforms as well as the challenges that sales leaders and sellers face, based on Forrester's own market data and a custom study of the same audience.
Tags : 
sales engagement plafform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tools, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide, Inc
Published By: ClearSlide, Inc     Published Date: Jan 28, 2015
This ClearSlide-commissioned profile of US enterprise sales leaders evaluates the current adoption trends surrounding sales engagement platforms as well as the challenges that sales leaders and sellers face, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
sales, increasing productivity, increasing revenue, sales performance optimization, sales performance, sales engagement
    
ClearSlide, Inc
Published By: Marketo     Published Date: Jun 06, 2016
Download this complimentary marketing automation buyer’s guide from TrustRadius, the most trusted research platform for business technology. This guide, which places Marketo in the Top Rated category, is based upon a distillation of 1,650 in-depth reviews of 20 leading marketing automation (MA) software products on TrustRadius. In it, you’ll get tips for succeeding with marketing automation and detailed profiles of each marketing automation platform from its end users.
Tags : 
marketo, marketing automation software, marketing
    
Marketo
Published By: Yesler     Published Date: Oct 29, 2014
Today’s B2B buyers are on the hunt for information. Your job as a marketer is to provide them with the content they are looking for - but first you have to know who they are and what they need to know. Get to know your buyers better by building composite profiles that describe their pain points, motivations, definitions of success, preferred communication channels, and more.
Tags : 
buyer personas, b2b buyers, content marketing, communication channels, content maps, b2b marketing, buyer journey, market research, lead generation
    
Yesler
Published By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: SnowFlake     Published Date: Jul 08, 2016
This EMA case study profiles the implementation of the Snowflake Elastic Data Warehouse, a new generation of cloud-based data warehouses, by Accordant Media. This document details significant tangible and intangible improvements and opportunities the Snowflake solution created for the Accordant Media infrastructure and analytical teams.
Tags : 
snowflake, media, data, technology, cloud-based data, best practices, business intelligence, productivity
    
SnowFlake
Published By: Profiles International     Published Date: Apr 08, 2011
Employee assessments can give organizations and managers consistent, in-depth, and objective information about their people. This Information helps leaders and managers rely less on gut instinct and make smarter people decisions.
Tags : 
employee assessment, job performance, hard skills, soft skills, job matching, employment lifecycle, productivity, roi, engagement, retention, organizational culture, climate, acquisition, utilization, efficiency, team chemistry, potential, solutions, business issues and trends, global hr management
    
Profiles International
Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics, business integration, business management, business metrics
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Enhance cybersecurity by reducing your attack surface CISOs understand that the smaller a company’s attack surface, the fewer areas need to be protected. Keeping a low profile lets you make better use of your resources. Esther Shein reports.
Tags : 
    
BlackBerry Cylance
Published By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : 
application fabric, performance computing, application performance, grid computing, infrastructure, appistry, enterprise applications, application performance management, analytical applications
    
Appistry
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection, anti spam, anti spyware, anti virus, application security, firewalls, internet security, intrusion detection, intrusion prevention, security management, security policies
    
McAfee Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.