offers

Results 326 - 350 of 1067Sort Results By: Published Date | Title | Company Name
Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection, anti spam, anti spyware, anti virus, internet security, security management, web service security, data protection
    
ESET
Published By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into what’s happening in AP, including insights on: • How the role of AP is continuously evolving • Key drivers that shape AP leaders’ plans and priorities • How automation technology is impacting AP • Operational benchmark statistics and recommended strategies
Tags : 
epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy, finance
    
Esker
Published By: Esker     Published Date: Jan 08, 2019
It’s not uncommon that customers are slow to adopt e-invoicing. Fortunately, we’ve got some tips on how your company can maximize the success of your AR automation project and persuade even the surliest of customers. In this guidebook, you’ll discover how to build a successful plan that: • Targets the right customers • Offers customers various payment options • Promotes & rewards e-invoicing adoption
Tags : 
    
Esker
Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance, security, data, protection, audit, standards, evaluation, criteria, provider, assurance, storage, hipaa compliance, cloud computing
    
EVault Inc.
Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise, cloud, infrastructure, it management, enterprise applications
    
Evident.io
Published By: F5     Published Date: Jan 25, 2013
Microsoft Exchange 2013 offers ways to meet productivity challenges but presents changes your infrastructure. This F5 paper takes a closer look at how the migration affects your infrastructure and offers strategies for ensuring a smooth transition.
Tags : 
architect, f5 networks, migration, network migration, smooth transition, network mobility, byod, bring your own device, infrastructure, it management, knowledge management, data center
    
F5
Published By: F5     Published Date: May 15, 2013
Elasticity is considered superior to traditional scalability because it attempts to exactly match resources to demand. Take a closer look at a ScaleN technology that offers a more efficient, elastic, and multi-tenant approach to meeting the challenges and demands of modern data center architectures. You’ll learn how elasticity can be achieved and how it offers multiple scalability models to better meet the sub-second failover and on-demand scalability required by modern business and IT organizations.
Tags : 
scalen, elastic infrastructure, technology, multi-tenant approach, over provisioning, it management, knowledge management, enterprise applications
    
F5
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs. Adopting an organizational standard for application delivery can reduce management and administrative costs and improve the ability of the organization to migrate smoothly from traditional to emerging application architectures, and address the unforeseen issues that always arise in the wake of the introduction of new initiatives.
Tags : 
network, application, delivery, big-ip, organization, platform, management, administrative, solution, adopt, find, search, wireless, local area networking, wide area networks, mobile workers, .net, java
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access from anywhere, at any time, on any device. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical to making mission-critical applications highly available, fast and secure.
Tags : 
network, load balancing, application awareness, resource, context-aware application delivery
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
While the choices facing you may seem daunting, the truth is that there’s never been a better time to shop for a web application firewall. WAF technology is now more accessible, affordable, and manageable than ever before—which is a good thing, because companies need the protection a WAF offers now more than ever. For more information about choosing the WAF that’s right for you, visit f5.com/security.
Tags : 
waf, companies, management, technology
    
F5 Networks Inc
Published By: Facebook     Published Date: Mar 07, 2012
The following white paper offers an in-depth analysis of how social media brand impressions reach Fans and Friends throughout Facebook, as opposed to just on brand Fan pages.
Tags : 
facebook, social media, emergeing marketing, digital marketing, online marketing, social media marketing
    
Facebook
Published By: Fathom SEO     Published Date: Jan 28, 2008
Learn what it takes to produce online videos that drive sales, leads and publicity for your business. This guide explains why Internet video is growing at such a rapid pace and offers tips on how to begin your own video marketing campaigns.
Tags : 
video marketing, youtube, online video, online movie, online sales, web video, lead generation, sales, marketing, video, web site, emerging marketing, fathom, fathom seo, marketing automation, sales automation, web development
    
Fathom SEO
Published By: Fathom SEO     Published Date: Feb 06, 2008
Watch what it takes to takes to produce online videos that drive sales, leads and publicity for your business. This quick presentation explains why Internet video is growing at such a rapid pace and offers tips on how to begin your own video marketing campaigns.
Tags : 
video, sales presentation, lead generation, videos, sales pitch, fathom, fathom seo, best practices, marketing automation, sales automation
    
Fathom SEO
Published By: FICO EMEA     Published Date: Feb 11, 2019
The automotive leasing and financing industry is facing its most competitive times. Market disruptors are moving quickly, leveraging technology to provide polished and high-value customer experiences to lure business away from more traditional lenders. However, the use of smart technology and automated credit decisioning can enable auto lenders to make accurate lending decisions and gain a competitive edge. Learn how you can: • Issue accurate and immediate credit financing decisions at the point of sale • Reduce delinquencies and credit losses • Grow your lending portfolio • Create winning offers using data and analytics • Speed up credit decisions to prospects and stay competitive • Use smart analytics to enhance the customer service experience Download the case study round up Digital Transformation for Automotive Finance to learn how you can transform your business.
Tags : 
collections treatment optimisation, customer retention, lending decision, collection optimisation, debt managemen, auto leasing financing, automated credit decisioning
    
FICO EMEA
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management, security, enterprise applications
    
Flexera
Published By: Focus     Published Date: Nov 15, 2011
With so many choices, how do you know which web conferencing vendor offers the right services and value for your company? Compare the pros and cons.
Tags : 
web conference, vendors, pros, cons, application, desktop sharing, video-conferencing, pricing
    
Focus
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a “Top Player” for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a “Top Player” in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, ”Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection.” They also cited that, “Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoint’s solution is leading edge.”
Tags : 
    
Forcepoint
Published By: ForeSee Results     Published Date: Feb 05, 2007
Free shipping, undoubtedly, is necessary to compete in the critical holiday season. But, is it really a competitive advantage? Does it drive short-term sales and long-term loyalty? And, are free shipping offers equally effective for repeat customers as for those that buy from a retail site for the first time?  ForeSee Results found some interesting answers to these questions.
Tags : 
e-commerce software, loyalty and retention, free shipping, e-tailers, e-commerce, foresee, foresee results
    
ForeSee Results
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks, ddos, network security appliance, security management, vulnerability management
    
Fortinet, Inc.
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.