advice

Results 126 - 150 of 310Sort Results By: Published Date | Title | Company Name

Safer Online Payments: Small business Payment Survival Guide.

Published By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : 
ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme, anti spam, anti spyware, anti virus, security management
    
Worldpay

Free Gartner Report - The Great Virtualization Dilemma: What You Need to Know

Published By: Dell-Intel     Published Date: Jun 19, 2009
Despite progress in virtualization, much development still remains. With predictions that virtualization will become pervasive, this research highlights forthcoming challenges and strategic issues facing IT planners. Register now for this free Gartner report sponsored by Dell and Intel to receive important advice on how to deal issues such as heterogeneity, resources and performance optimization, and the increasing fragmented tool market.
Tags : 
dell, intel, virtualization, gartner, it planner, server virtualization, servers, ovf, itil, vmware, xen, vmotion, homogeneity, x86, cloud migration, cloud, infrastructure, server hardware, blade servers, storage management
    
Dell-Intel

Social Software Strategies for the Enterprise -- Cisco, Nike & Forrester Research roundtable

Published By: Jive Software     Published Date: Oct 08, 2009
Learn best-practices for implementing a social software strategy, as leaders from Nike, Cisco, and Forrester share advice and anecdotes in a Social Business Software Roundtable discussion.
Tags : 
cisco, jive, social software strategy, social media tools, online communities, internal social network, social business software
    
Jive Software

Boosting Customer Loyalty with Social Software -- InterContinental Hotels Group case study

Published By: Jive Software     Published Date: Oct 12, 2009
Priority Club Connect encourages members to talk directly with IHG management through a video blog on the community and to participate in special offers available only through the community. Listen to this webcast recording to get strategies and advice for your own social media initiatives.
Tags : 
social business software, social media, online community, customer loyalty, jive
    
Jive Software

Accelerate Product Innovation, Get Your Customers Involved -- SAP case study

Published By: Jive Software     Published Date: Oct 12, 2009
Powering the ecosystem with the Collaboration Workspace, a branded online community, helps SAP continue its tradition of industry leadership and customer value. Watch this on-demand webcast to get strategies and advice for your own social media initiatives.
Tags : 
ecosystem, jive, collaboration workspace, sap, online community, social media, validation, customer feedback
    
Jive Software

From virtualization to private cloud: Cut through the cloud clutter

Published By: Red Hat     Published Date: May 17, 2012
This paper, the first in a series of 4, offers practical advice for cutting through the clutter and getting started with a private or hybrid cloud strategy that successfully builds on your current data center.
Tags : 
networking, virtualization, cloud computing, infrastructure
    
Red Hat

Removable Media Best Practices: Business-aligned Security Strategies and Advice

Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection, anti spam, anti spyware, anti virus, security management
    
CREDANT Technologies

Creating a Code of Conduct: Providing Guidance for an Ethical Workplace

Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : 
skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior, knowledge management, enterprise applications
    
Skillsoft

Choosing The Right Security Assessor

Published By: CDW     Published Date: Nov 13, 2012
Guidance for finding a vendor who can provide advice and insight into your unique security environment.
Tags : 
cdw, security assessor, unique security environment., business technology
    
CDW

Application Performance Management Best Practices: 2013 State of the Art & Trends

Published By: Compuware     Published Date: Aug 30, 2013
Download the 2013 State of the Art and Trends and know the latest in application performance management (APM). This collection of best practice articles provides practical advice for managing the key application performance challenges you will face in 2013.
Tags : 
application performance management
    
Compuware

10 Tips for Managing the Four C’s

Published By: Polycom     Published Date: May 12, 2015
Infographic featuring ten pieces of advice for successfully addressing issues with compliance, customers, competitiveness, and complexity.
Tags : 
polycom, enterprise, collaboration, fsi, compliance, customer, customer interaction service, customer relationship management, customer satisfaction, customer service, enterprise software
    
Polycom

Video: TotalTrax Transforms with Rackspace DevOps Accelerator

Published By: Rackspace     Published Date: Jul 23, 2019
Coupling recommendations from the Rackspace DevOps Accelerator engagement with expert advice from Rackspace applications specialists, TotalTrax deployed Fanatical Support for AWS and integrated cloud-based containers to manage customer deployments faster and automate processes.
Tags : 
    
Rackspace

HR Strategies: Best practices for meeting today's top challenges

Published By: SAP     Published Date: Feb 26, 2016
In this document, we’ve pulled together relevant research and advice based on both expert research and the experiences of our own customers.
Tags : 
sap, human resources, research, analytics
    
SAP

Push the Boundaries of Sales and Operations Planning with Optimization

Published By: FICO     Published Date: Mar 02, 2018
Sales and Operations Planning (S&OP) isn’t just about aligning supply and demand. Ultimately, businesses across all industries need to synchronize plans across all functions to strike the right balance between demand, resources and other constraints. Companies are realizing that their use of analytics to help improve decision making needs to evolve beyond just reporting to include machine learning and optimization. Download our latest Q&A now with published author and supply chain expert Mike Watson, and learn how virtually any S&OP decision can benefit from advanced analytics and automation. You’ll get practical advice to help build a strawman, so you can move forward quickly – before your competitors! Read this Executive Brief to know the Top 7 Questions to ask before deploying your Sales and Operations planning.
Tags : 
operations, sales, supplier, inventory, resources
    
FICO

Press #1 For Customer Service

Published By: Infosys     Published Date: May 21, 2018
Our client was a large financial institution with millions of customers using a wide range of products. So when customers called the contact center, they could have any query out of a possibility set of 68 categories. They would want investment advice, or ask about their account. Or they would simply want to reset their PIN. The trouble was that the large range of support offered at the contact center meant long and complex phone calls, as customers often found their way through the interactive voice response (VR) system to the wrong agent. They had to be re-routed-often several times- which gave our clients two problems.
Tags : 
customer, service, automation, voice, response
    
Infosys

Beyond Liquidity: Optimizing Product Selection (Greenwich Associates)

Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
best practices, business management, return on investment, business technology
    
iShares by BlackRock

Solve Hybrid Cloud Challenges for Secondary Data and Apps

Published By: Cohesity     Published Date: Aug 09, 2019
Data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide.
Tags : 
    
Cohesity

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future

Security Technologies for Mobile and BYOD

Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : 
mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky, anti spyware, anti virus, application security, security management, mobile device management
    
Kaspersky

The Definitive Guide to Account-Based Marketing

Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo

The Definitive Guide to Account-Based Marketing

Published By: Marketo     Published Date: Mar 22, 2018
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders to
Tags : 
    
Marketo

Intel Premier IT Professionals Virtual Event: IT Therapy Creating Beautiful Relationships

Published By: Intel     Published Date: Jun 10, 2011
Join Intel IT leaders and participating companies HP, Lenovo, Absolute Software, Citrix, and Symantec for a morning packed with the latest technology, expert advice and demos.
Tags : 
business technology, intel, cloud, data, client security, desktop virtualization, kvm, encryption, it infrastructure, infrastructure, internetworking hardware, network architecture, server hardware, storage virtualization, cloud computing
    
Intel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.