programs

Results 326 - 350 of 561Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus, anti spam, anti spyware, application security, internet security, intrusion detection, intrusion prevention, policy based management, security management, security policies, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Tags : 
siem, log management, federal agency, compliance, situational awareness, visualization, security
    
McAfee
Published By: Meltwater     Published Date: Jan 16, 2015
Your customers and competition are talking. Are you listening? Social listening is the most significant technology to hit marketing since social media itself. But marketing isn’t the only department that can utilize social listening: your entire business organization can use social listening to inform its programs, products and business decisions.
Tags : 
meltwater, social media monitoring, media monitoring, social media analytics, media analytics, pr software, social marketing software, social marketing listening, media listening
    
Meltwater
Published By: Meltwater     Published Date: May 28, 2015
This report replaces an earlier report that was formerly the continuous improvement report for this playbook.
Tags : 
social data, social marketing, marketing maturity, marketing strategy, customer insights, marketing programs, technology brands, customer interaction service
    
Meltwater
Published By: Meltwater     Published Date: Oct 14, 2015
Everyone needs something to strive for to keep them on track. When you (or your boss) are wondering if you’re doing a good job, key performance indicators (KPIs) are there to answer the question and nudge you to even greater heights. But what are the right KPIs? And how do you access the right data to use them effectively? Download our e-book on data-driven marketing today for a complete breakdown of KPIs by marketing role, plus the techniques and tools you need to measure your programs.
Tags : 
meltware, marketing, kpi, data, digital marketing, customer marketing
    
Meltwater
Published By: Meltwater     Published Date: Apr 13, 2016
Picture a world where everyone on your marketing team has the information they need to be successful. Each team member uses KPIs to set ambitious but achievable goals—and everyone knows exactly where their programs stand.
Tags : 
data management, business practices, marketing, public relations, communications
    
Meltwater
Published By: Micro Focus     Published Date: Aug 28, 2014
Enabling technologies to streamline regulatory and legislative changes.
Tags : 
it compliance programs, risk management, it management, data management, compliance
    
Micro Focus
Published By: Microsoft Dynamics CRM     Published Date: Mar 02, 2010
While the new generation of self-service applications for the Web and IVR is excellent, successful self-service programs will depend on giving customers choices and striking the right balance.
Tags : 
microsoft dynamics crm, contact call center, self-service application, ivr, interactive voice response, customer service interaction, live agent support, automated self-service, automation, business process automation, call center management, call center software, customer interaction service, customer relationship management, customer satisfaction, customer service, electronic design automation
    
Microsoft Dynamics CRM
Published By: Microsoft Office     Published Date: Sep 17, 2008
See Microsoft® Office Professional Plus 2007 in action. Find out how this integrated set of business productivity programs helps you work more efficiently and deliver better results faster.
Tags : 
microsoft, office, microsoft office, productivity, information work, iw tools, desktop tools, desktop, it management, desktop management
    
Microsoft Office
Published By: Microsoft Office     Published Date: Jan 05, 2009
This is an online test drive of Microsoft® Office 2007 programs. This real-time test drive is the fastest way to try out Microsoft Office 2007 and does not require product installation or download. In just minutes you can start exploring Microsoft Office through your web browser on your own, or follow the step-by-step tutorials to experience all of its useful features.
Tags : 
microsoft, microsoft office 2007, free trial, test drive, microsoft sharepoint 2007, microsoft access 2007, microsoft excel 2007, microsoft infopath 2007, microsoft onenote 2007, microsoft outlook 2007, microsoft outlook web access 2007, microsoft powerpoint 2007, microsoft project 2007, microsoft publisher 2007, microsoft visio 2007, microsoft word 2007, enterprise applications, platforms, application integration, business management
    
Microsoft Office
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: Mitel     Published Date: Dec 20, 2016
Remote working programs can deliver great advantages to employers alike, but they require a higher level of connectivity to function at their best. Mobility tools like those from Mitel can help keep your employees connected and productive anywhere with a seamless, user-friendly experience.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Dec 20, 2016
Remote working programs can deliver great advantages to employers alike, but they require a higher level of connectivity to function at their best. Mobility tools like those from Mitel can help keep your employees connected and productive anywhere with a seamless, user-friendly experience.
Tags : 
    
Mitel
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this report for a comprehensive review of cross-industry benchmarks and gain an excellent resource for companies wishing to assess their organization's reporting data.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, legal issues
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
In this paper, you'll learn more about each of the four Board responsibilities outlined in the U.S. Sentencing Guidelines with respect to ethics and compliance programs.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, legal issues
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment, legal issues
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, legal issues
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, legal issues
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver, protection, reputation, human resources, best practices, business integration
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : 
navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix, training programs, compliant culture, risk assessment, qualified third parties, best practices, business intelligence
    
NAVEX Global
Published By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : 
compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas, security management, risk management
    
NAVEX Global
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security, application security, security policies, vulnerability management, cloud computing
    
Navisite- A Time Warner Cable Company
Published By: Neolane, Inc.     Published Date: Jan 08, 2010
This white paper outlines how B2B marketers can build the foundation for their own lead nurturing programs to increase campaign effectiveness, maintain the interest of prospects through the entire sales cycle, and deliver automated time- and event-triggered inbound and outbound programs.
Tags : 
neolane, b2b marketer, lead nurturing program, lead generation, campaign, marketing automation, lead management optimization, enterprise marketing software
    
Neolane, Inc.
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.