data set

Results 1 - 25 of 557Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security, security management, business analytics, business integration, business intelligence
    
Absolute Software
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Adlib Software
Published By: Adobe     Published Date: May 13, 2015
Discover how data management platforms can enable marketers to tackle growing data challenges, create powerful customer insights and set up marketing campaigns that increase revenues and significantly decrease media wastage.
Tags : 
data management buyers guide, data management platforms, data challenges, the rise of dmp, benefits of dmp
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
Discover how data management platforms can enable marketers to tackle growing data challenges, create powerful customer insights and set up marketing campaigns that increase revenues and significantly decrease media wastage.
Tags : 
data management buyers guide, data management platforms, data challenges, the rise of dmp, benefits of dmp, content management system
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
Discover how data management platforms can enable marketers to tackle growing data challenges, create powerful customer insights and set up marketing campaigns that increase revenues and significantly decrease media wastage.
Tags : 
data management buyers guide, data management platforms, data challenges, the rise of dmp, benefits of dmp, content management system
    
Adobe
Published By: Adobe     Published Date: Apr 03, 2015
A lack of executive support and poor data quality are just some reasons why analytics programs fail. The guide by Adam Greco, Reenergize Your Web Analytics, identifies the key reasons for program failures and provides ten ways to make your analytics program successful. Read the guide to discover key ways to improve your analytics program, including: • How to deal with your stakeholders • How to set your analytics priorities • How to reap the rewards of change
Tags : 
analytics program, stakeholders, adobe, marketing, personalization
    
Adobe
Published By: Adobe     Published Date: Sep 16, 2016
Meet the trends that are impacting your ability to create, manage, deliver and optimize your digital assets. The Adobe white paper, 7 Trends Impacting How We Use Digital Assets, identifies the trends that help you deliver more meaningful customer experiences with the right assets, through the right channels, at the right time. Read the Adobe white paper to learn: • How metadata can help increase brand consistency across multiple channels and devices • Why marketers need digital asset tools that increase responsiveness to consumers in real time • The importance of rich media in delivering personalized content that deepens customer connections
Tags : 
adobe, digital, digital asset management, dam, digital asset management system, customer experience, digital assets, enterprise applications
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2017
Meet the trends that are impacting your ability to create, manage, deliver and optimize your digital assets. The Adobe white paper, 7 Trends Impacting How We Use Digital Assets, identifies the trends that help you deliver more meaningful customer experiences with the right assets, through the right channels, at the right time. Read the Adobe white paper to learn: • How metadata can help increase brand consistency across multiple channels and devices • Why marketers need digital asset tools that increase responsiveness to consumers in real time • The importance of rich media in delivering personalized content that deepens customer connections
Tags : 
digital assets. adobe, metadata, digital assets, channeling
    
Adobe
Published By: Adobe     Published Date: May 15, 2018
Discover how data management platforms can enable marketers to tackle growing data challenges, create powerful customer insights, and set up marketing campaigns that will increase revenues and significantly decrease wasted effort.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Customers expect to have the same experience with a store no matter where they are shopping – in a brick and mortar location, on the store’s website via laptop or on the store’s app via mobile device. Combining online and offline data helps retailers stay informed about their customers so they can drive customer loyalty and increase revenue.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Put your data in the hands of those who need it most, so they can act quickly to deliver great customer experiences. And a better bottom line. Data is no longer the domain of a few. Everyone in your organization should be thinking about it. And more importantly, acting upon it. This means taking data insights out of the realm of data scientists and making them a natural part of everyone’s workflow — from the marketing department to the executive team. To seize and capitalize on the data you already have, it’s important for analysts and marketers to rethink data—shifting from a reporting mindset to an action mindset. 74% of organizations want to be data driven, yet only 29% say they’re good at connecting analytics to action.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Data is a company’s most valuable asset. Just look at Forbes’ World’s Most Value Brands list. No longer is a company’s worth evaluated by its tangible assets — data has changed all of that. Every business today relies on data. The ability to filter through volumes of data to capture true insights is critical to gaining a competitive advantage. Companies aspiring to deliver the best possible customer experiences must be able to unify different types of information, including behavioral, transactional , and operational data
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
Discover how data management platforms can enable marketers to tackle growing data challenges, create powerful customer insights, and set up marketing campaigns that will increase revenues and significantly decrease wasted effort.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2018
Discover how data management platforms can enable marketers to tackle growing data challenges, create powerful customer insights, and set up marketing campaigns that will increase revenues and significantly decrease wasted effort.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jul 10, 2019
Every organisation is at a different point in their progression with campaign management. Maybe you’ve had some success with email marketing and you want to expand your efforts across additional channels. Perhaps you invested in a campaign management solution several years ago when you had fewer marketing channels, simpler data sets and less sophisticated customers. It could be you’re a new marketing team, eager to set yourself up for success with an enterprise-class campaign management solution that meets all the requirements you know about—and even some you don’t.
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.