businesses

Results 2226 - 2250 of 2546Sort Results By: Published Date | Title | Company Name

Protecting PoS Environments Against Multi-Stage Attacks

Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale, software development
    
Symantec Corporation

Beyond SSL

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation

Economist: Smart SMBs Fine-tuning the Engines of Growth

Published By: Symantec     Published Date: Nov 04, 2013
An executive summary of an Economist Intelligence Unit Survey
Tags : 
symantec, the economist, economist intelligence unit survey, global gdp, small and medium-sized businesses, smb, security
    
Symantec

Protecting Your Business Data: Five Dos and Don'ts for SMBs

Published By: Symantec     Published Date: Nov 04, 2013
Small and midsized businesses have a particularly challenging time protecting company data. They have many of the same security and backup challenges as large enterprises, but fewer resources in terms of funding, time and specialized expertise.
Tags : 
symantec, security, protecting data, smbs, symantec’s state of information survey, projected data stores, software development, it management
    
Symantec

Phishing Tactics

Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
Symantec

Hidden Dangers Lurking in E-Commerce - Reducing Fraud with the Right SSL Certificate

Published By: Symantec     Published Date: Oct 01, 2015
The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
e-commerce, ssl certificate, ssl golden rules, hidden dangers, website security, security
    
Symantec

Frost & Sullivan Analyst Paper, 'Six Golden Rules for Selecting an SSL Certificate'

Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec

Privacy and Safety: How SSL Certificates Empower Your Business

Published By: Symantec     Published Date: Oct 01, 2015
Best-of-breed SSL certificates reassure businesses and customers about the security and the ease of conducting transactions over the Internet. Ideally, SSL Certificates form an integral part of a company's overall IT strategy.
Tags : 
ssl certificates, business and customer security, it strategy, privacy and safety, security
    
Symantec

6 Steps to a Mobile-Friendly Website That Drives Conversions

Published By: Crownpeak     Published Date: Jul 29, 2015
This guide is intended to help you navigate the path to a mobile-friendly website that positions your company to succeed now and in the future. As we go into detail on the exponential growth of mobile and it's disruptive impact on businesses that have not yet adapted, we will discuss the 6 steps you need to take to prepare for this change in mobile adoption.
Tags : 
crownpeak, ebook, mobile friendly websites, mobile responsive design, conversion-optimized website design, wcm, web content management, personalization
    
Crownpeak

Infographic: Four Ways to Improve IT Operations with All-Flash Storage

Published By: NetApp     Published Date: Jun 27, 2016
Wondering if all-flash storage will improve your IT operations? It can eliminate performance bottlenecks, improve user productivity, and simplify your operations. Learn how businesses in different industries have benefited from all-flash storage.
Tags : 
    
NetApp

Flash Compilation Video

Published By: NetApp     Published Date: Jun 27, 2016
Flash storage helps businesses exceed their expectations for speed, the end-user experience, and performance. Leaders from Citrix, Apache, and Western Oregon University speak about the challenges they overcame and how NetApp® flash solutions helped them to win.
Tags : 
    
NetApp

5 Traits of a Good Phone System

Published By: CompareBusinessProducts     Published Date: Feb 27, 2015
The business phone system search can be a complex one… but there are some must-have features that will help you narrow down your search. Our new infographic details the features that really matter for most businesses.
Tags : 
phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
    
CompareBusinessProducts

Modernizing Software Delivery through Software-Defined Environments

Published By: IBM     Published Date: May 18, 2015
To stay relevant and competitive in business today, companies must respond and interact with their customers in ways that were simply inconceivable a decade ago. Mobile, social and cloud are enabling businesses to better engage with customers, but these technologies put new pressures on businesses.
Tags : 
cloud applications, mobility, application integration, customer feedback, software defined environments, automate manual process, improving productivity, collaboration
    
IBM

A Hub & Spokes Technology: Social Media Strategy for Enterprise Businesses

Published By: Cision     Published Date: May 02, 2016
In the following paper, we will share the following key strategies that will fuel a successful social media strategy for your business. We will: - Outline the six strategies and technologies for creating a framework for success - Map out a social implementation model for setting up the distribution of your content in order to protect your brand when third-party platforms, such as Google and Facebook, inevitably make changes - Share the right way to think about measuring, monitoring and managing your social media strategy and performance
Tags : 
cision, social media, social media strategy, marketing
    
Cision

Best Practices for a Lead Management Strategy

Published By: Act-On     Published Date: Jan 08, 2015
New customer acquisition is the lifeblood of many businesses, but it can be costly. Comprehensive lead management strategies have been developed to maximize lead value and bring order and efficiency to the top of the marketing funnel. Such strategies emphasize quality, precision, and the increased probability of conversion. When well-executed, lead management strategies can produce significant savings, reduce time spent in the funnel, and bring sales and marketing into closer concert.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy
    
Act-On

State of the Industry 2016

Published By: AdRoll     Published Date: Jan 21, 2016
A closer look at retargeting, programmatic advertising, and performance marketing. Due to its prevalence, it's easy to lose track of how new the programmatic advertising industry is. And as with any new industry driven by a disruptive technology, things are changing quickly. We surveyed 1,050 US marketers across industries to uncover how businesses are adopting new marketing opportunities brought about by programmatic advertising.
Tags : 
adroll, retargeting, programmatic advertising, performance marketing, programmatic advertising, marketers spend
    
AdRoll

The E-commerce Guide to Marketing on Instagram

Published By: AdRoll     Published Date: Jan 04, 2019
With over 1 billion active users and counting, it’s no secret that Instagram has rapidly become a major tool for businesses looking to drive tangible sales. From simple advertising options to shoppable post features, it’s now a platform that can help you find and meet your customers—right at their fingertips. But how can you start reaping the benefits for your business? In our new guide The E-commerce Guide to Marketing on Instagram, you’ll find the latest tactics around building awareness, growing your community, and reaching users at every stage of the buyer journey. Designed with marketers in mind, this practical guide also covers: Working with AdRoll to get the most out of the platform The Dos and Don’ts of advertising on Instagram Insightful case studies Actionable tips on everything from branding your profile to creating Instagram ads So, if you’re ready to harness the power of Instagram to take your business to new heights, download our handy guide today.
Tags : 
    
AdRoll

Beyond B2B - A New View of the Institutional Market

Published By: MCH     Published Date: Jan 29, 2007
Not all B2B customers are businesses.  There is a parallel world of non-businesses among your customers that you may not be fully aware of.  Beyond B2B lies the Business-to-Institution (B2i) market, a sector that includes over 2 million institutions, spending $4.1 trillion annually. 
Tags : 
b2b, business to business, b-to-b, institutional marketing, institution, database and list managers, mch, mailings.com
    
MCH

B2B Online Marketing Guide: 5 Critical Steps

Published By: Omniture     Published Date: Jun 27, 2007
Over the past ten years, as online options have increased 100 fold, the world of B2B marketing has reinvented itself—several times. In order to be competitive, particularly in the Web 2.0 environment, businesses have to be ahead of the trends.
Tags : 
lead generation, conversion, conversions, b2b, b-to-b, business to business, web marketing, conversion testing
    
Omniture

Why Cloud Computing is Requiring us to Rethink Resiliency at the Edge

Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric

New Business Models for Smart Machines

Published By: Schneider Electric     Published Date: May 03, 2018
Before creating new technologies, we must think about how to create the right values to be also able to sell it. All the technology that is required for “Industry 4.0” is available today already, so in fact Industry 4.0 can be seen more than an innovation driver for new businesses that are not exploited today, than an innovation driver for technology. If these existing technologies are assembled properly together and combined with the right business models, there is really good chance to profit from Industry 4.0. This white paper looks into the ways one can profit from Industry 4.0 by differentiating through new business models.
Tags : 
smart machines, industry 4.0, smart factory, iiot, opc ua, data, analytics, machine services
    
Schneider Electric

Opportunities and threats to colocation providers from around the globe

Published By: Schneider Electric     Published Date: Jun 07, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which ,can have both a positive and negative impact on their businesses.
Tags : 
emerging threats,  user experience,  digital transformation,  schneider electric
    
Schneider Electric

SMB Backup: Make a Wise Decision

Published By: ProStor Systems     Published Date: Mar 15, 2007
This white paper covers the need for backup and the unique challenges faced by small and medium sized businesses when addressing storage needs. He then highlights different backup options and selection criteria for choosing the best backup solution.
Tags : 
backup, smb, hardware, archiving, security, small business networks, backup and recovery, small business
    
ProStor Systems

Storage Operations Management - A Holistic Process

Published By: Creekpath     Published Date: Aug 21, 2009
There is a holistic storage-management trend taking place in companies today. IT groups are acknowledging that storage should become part of the network. What businesses are finally seeing is that storage is not an isolated island, or a group of isolated islands, but part of a holistic management domain.
Tags : 
holistic, storage management, storage, storage operations management, som, it management, systems management, creekpath
    
Creekpath

The Solution for Growing Application Deployment & Support Demands Placed on IT Administrators

Published By: Desktop Sites     Published Date: Aug 21, 2009
Konect is a powerful and cost-effective serverware solution for the growing application deployment and support demands placed on IT administrators in small and mid-size businesses.
Tags : 
application deployment, deploy applications, app deployment, serverware, konect, small business, smb, smbs
    
Desktop Sites
Start   Previous    83 84 85 86 87 88 89 90 91 92 93 94 95 96 97    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.