profile

Results 251 - 275 of 299Sort Results By: Published Date | Title | Company Name
Published By: CrowdTwist     Published Date: Apr 16, 2018
In order for brands to compete and provide the level of personalization consumers have already come to expect, marketers need to work quickly to develop competencies around their abilities to collect contextual and anticipatory insight and meet customers in the moments that matter most to them. Now is the time for marketers to invest in technology that supports data capture, segmentation, predictive analytics, and machine learning. With these capabilities in place, brands should be on track to build rich first party profiles of customers across all channels and maximize customer lifetime value by creating relevant experiences at all stages of the customer lifecycle.
Tags : 
customers, predictive, branding, consumers, competition, lifecycle
    
CrowdTwist
Published By: CrowdTwist     Published Date: Jul 25, 2018
Over the last decade customer-brand relationships have become more and more digitized. Companies have enjoyed access to new technologies, new capabilities, and greater access to customer data. In turn, consumers have become better informed and able to connect with brands with greater flexibility and convenience. However, concerns around mismanagement of customer data, the proliferation of fake news, high profile retailer database breaches, and the Cambridge Analytica scandal has contributed to an erosion of trust between consumers and brands and demands for data privacy. What can brands do to overcome consumer skepticism? What keeps a customer coming back in 2018? And what can brands do to demonstrate relevancy and provide value?
Tags : 
customer, branding, relationships, consumer, database
    
CrowdTwist
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware
Published By: Net Atlantic     Published Date: Jun 04, 2010
Register for this live event: Date: Thursday, September 2, 2010 Time: 2:00pm EDT / 11:00am PDT Length: 1 Hour During this one hour session, we'll discuss 5 components of a successful email marketing strategy and how to increase relevance through segmentation and targeting, including: .creating and delivering relevant content; .applying profile and behavior-based targeting; .automating email campaigns to match the customer purchase lifecycle; .achieving the right contact frequency for your audience; and .testing your strategy for effectiveness.
Tags : 
email marketing, webinar
    
Net Atlantic
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: AdRoll     Published Date: Jan 04, 2019
With over 1 billion active users and counting, it’s no secret that Instagram has rapidly become a major tool for businesses looking to drive tangible sales. From simple advertising options to shoppable post features, it’s now a platform that can help you find and meet your customers—right at their fingertips. But how can you start reaping the benefits for your business? In our new guide The E-commerce Guide to Marketing on Instagram, you’ll find the latest tactics around building awareness, growing your community, and reaching users at every stage of the buyer journey. Designed with marketers in mind, this practical guide also covers: Working with AdRoll to get the most out of the platform The Dos and Don’ts of advertising on Instagram Insightful case studies Actionable tips on everything from branding your profile to creating Instagram ads So, if you’re ready to harness the power of Instagram to take your business to new heights, download our handy guide today.
Tags : 
    
AdRoll
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: TriTuns Innovation     Published Date: Nov 21, 2008
Discover the tangible benefit of creating and delivering Customer Engagement Campaign emails that integrate corporate marketing with their sales team profiles (From address, their picture, a message from them - along with all the relevant corporate content), for a true 'connected' solution.
Tags : 
tailored mail, email marketing program, customer engagement campaign, email service provider, email campaigns
    
TriTuns Innovation
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software
Published By: Red Gate Software     Published Date: Oct 19, 2007
This short white paper discusses the common pitfalls and performance problems .NET developers come across when creating applications. The paper also presents several ways of getting around these issues, so that developers can make their .NET applications perform the way they should.
Tags : 
scalability, performance, performance problem, performance problems, .net, .net application, optimize code, .net profiling, profile .net, complexity, dot net, red-gate, red gate, redgate, software development, application performance management, quality assurance, software testing
    
Red Gate Software
Published By: MoreVisibility     Published Date: May 07, 2012
When it comes to Social Media Marketing, setting up your business pages and profiles is only the first step. How do you grow and maintain an active social media audience? In this White Paper we explore key ideas for making your social media content more engaging for prospects and customers.
Tags : 
morevisibility, social media, google, internet marketing, emerging marketing, marketing tools, marketing campaigns
    
MoreVisibility
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption, identity management, vulnerability management
    
Symantec.cloud
Published By: Profiles International     Published Date: Aug 30, 2010
Download this guide we'll provide you with the Top 5 Strategies for Motivating and Retaining Top-Performing Employees: Employee Orientation, Performance Evaluations, Occupational Assessments, Succession Planning
Tags : 
retention, keeping employees, staffing
    
Profiles International
Published By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator, secure copy, service explorer, security explorer, enterprise security reporter, scripting, drive mapping, printer deployment, roaming profiles, outlook profiles, group policy management, server management, ntfs permissions
    
ScriptLogic
Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus, network security, remote access, remote network management, access control, ipsec, security management, mobile workers, wireless hardware, vulnerability management
    
Avocent
Published By: Dell Storage     Published Date: Apr 21, 2011
The Dell Compellent vSphere Plug-In currently under development will enable data center administrators to manage many aspects of Dell Compellent Fluid Data storage directly through the VMware vSphere client. This demo video shows how to leverage the integration to provision and map storage volumes for VMFS datastores, create storage profiles for automated tiering and continuous snapshots, and recover datastores to virtually any point in time - all through a single interface. (4 min)
Tags : 
dell compellent, server, storage, vmware vsphere, integration, compellent vsphere plug-in, fluid data storage, storage area networks, storage management, storage virtualization, business integration, infrastructure
    
Dell Storage
Published By: Berkshire Associates     Published Date: May 09, 2011
Berkshire's white paper examines the different compliance needs in the Manufacturing, Healthcare, and Finance Industries
Tags : 
affirmative action, manufacturing, finance, health care, compliance, human resources, ofccp, business issues and trends, compensation, human resources management, staffing
    
Berkshire Associates
Published By: Symantec     Published Date: Oct 02, 2012
Stuxnet,a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
malware, code, signing, certificates, software, stuxnet
    
Symantec
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, disaster recovery, email security, encryption, high availability, security management
    
Mimecast
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Taneja Group Solution Profile takes a closer look at what business continuity means in a storage system, and examines the approaches that vendors typically take to providing it. This paper looks into HP3PAR StoreServ 7000 and more.
Tags : 
san storage, intel, intel, hp 3par, hp storeserv, it management, data management, data center
    
Sponsored by HP and Intel® Xeon® processors
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.