businesses

Results 2301 - 2325 of 2513Sort Results By: Published Date | Title | Company Name

2010 Threat Predictions

Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security, anti spam, anti spyware, anti virus, application security, identity management, internet security, policy based management, security management, security policies, web service security
    
McAfee

Business Communications in Context Putting the U in UC

Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery, business continuity, mobile workers
    
NEC

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers

Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers, business rule management systems, brms, encryption, security management, web sphere
    
IBM ILOG.

F-RAM vs. BBSRAM: Functional and System Design Comparisons

Published By: Ramtron     Published Date: Nov 11, 2009
Today's technological innovation demands high performance coupled with low environmental impact. These dual requirements are driving components of the semiconductor industry which informs many global businesses and consumer lives.
Tags : 
f-ram, bbsram, random access memory, ram, novram, ecopack, electronics, semiconductor, memory, ramtron, system on a chip, electronic test and measurement, embedded design, boards & modules, embedded systems and networking, integrated circuits and semiconductors
    
Ramtron

Business.com's 2009 Business Social Media Benchmarking Study

Published By: Business.com     Published Date: Nov 06, 2009
Benchmark your business social media initiatives with this free whitepaper summarizing insights from nearly 3,000 North American businesses - the largest study of business social media use conducted to date. Discover valuable insights into company social media initiatives designed to drive web site traffic, engage customers and build brands.
Tags : 
business.com, social media
    
Business.com

Top 10 SEO mistakes. Are you ranking for keywords but still don't get relevant traffic/conversions?

Published By: Tsavo Agency     Published Date: Oct 29, 2009
Businesses managers and website owners today need to have some basic Search Engine Optimization (SEO) knowledge whether they work with an internal SEO team or hire an SEO agency to get top Search Engines rankings. Based on years experience optimizing websites for search engines, we have put together a list of the most problematic and common on page SEO issues. Find out if your site is suffering from any of these on page SEO issues.
Tags : 
tsavo, traffic, conversions, seo, search marketing, keywords, rich content, optimizing, cms, traffic
    
Tsavo Agency

Whitepaper - Next-generation data protection for midsized companies.

Published By: IBM     Published Date: Oct 21, 2009
The purpose of this white paper is to provide an overview of next-generation data protection and recovery options that are designed and priced specifically for small and midsized businesses (SMBs).
Tags : 
data protection, ibm, recovery point objective, rpo, backup, ngdp, disk-based backup, disaster recovery, business continuity, tivoli, backup and recovery
    
IBM

See how embracing change helps the global financial markets survive.

Published By: IBM     Published Date: Oct 15, 2009
In the white paper, "Toward Transparency and Sustainability: Building a New Financial Order," you'll see how businesses are building sustainable, stable systems for the years to come, while fulfilling their brand promises.
Tags : 
global financial market, ibm, identity crisis, processors, over-the-counter, otc, market capitalization, banking system, financial architecture, roi, spend management, identity management, return on investment, financial management
    
IBM

Virtualization for midsize businesses: reduce cost, improve service and manage risk.

Published By: IBM     Published Date: Oct 14, 2009
This paper shows how mid-sized companies can benefit by implementing a virtualization strategy. Unique, industry-leading capabilities from IBM, Intel and VMware are highlighted.
Tags : 
virtualization, unique, roi, it infrastructure, servers, business continuity, system management, risk management, return on investment, server virtualization, system management software
    
IBM

Endpoint Security: Proactive Solutions for Networkwide Platforms

Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture, anti spam, anti virus, application security, hacker detection, network security appliance
    
ESET

iovation ReputationManager: Unlock the Power of Device ID to Combat Online Fraud and Abuse

Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation, application security, auditing, internet security, security management, web service security
    
Iovation

UK Service Provider Relies on Trend Micro Hosted Security Solutions to Better Protect Small Business

Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager, anti spam
    
Trend Micro SaaS

5 Steps for Reducing Downtime

Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, network management, servers, small business networks, server virtualization, system management software, microsoft exchange, windows server, service oriented architecture
    
Marathon Technologies

Which is Best? Inhouse Versus Outsourcing Web Hosting

Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
How can a company decide what the right decision is when it comes to outsourcing? A growing percentage of companies are reaping the benefits of leveraging technology to streamline business operations and automate their business processes to create greater efficiencies by turning to outsourced web hosting. In today's economy, more and more small to medium sized businesses with no IT staff, or an already over-burdened IT staff, are finding there is no other choice. However, even with companies that have the resources necessary to host their own websites are looking to outsource their hosting needs. For these companies not resources, but the issue of ensuring that the hosting environment is secure, reliable, and scalable is why they look towards outsourcing. Learn the pros and cons of outsourcing and how NeoSpire can help.
Tags : 
web hosting, neospire, microsoft sql server, oracle, mysql, hosting options, security, costs, minimal operating costs, freeing assets, aberdeen group, software outsourcing, web development, web services, microsoft exchange, web service management
    
NeoSpire Managed Hosting

Storage Operations Management - A Holistic Process

Published By: Creekpath     Published Date: Aug 21, 2009
There is a holistic storage-management trend taking place in companies today. IT groups are acknowledging that storage should become part of the network. What businesses are finally seeing is that storage is not an isolated island, or a group of isolated islands, but part of a holistic management domain.
Tags : 
holistic, storage management, storage, storage operations management, som, it management, systems management, creekpath
    
Creekpath

The Solution for Growing Application Deployment & Support Demands Placed on IT Administrators

Published By: Desktop Sites     Published Date: Aug 21, 2009
Konect is a powerful and cost-effective serverware solution for the growing application deployment and support demands placed on IT administrators in small and mid-size businesses.
Tags : 
application deployment, deploy applications, app deployment, serverware, konect, small business, smb, smbs, it spending, cost control, it management, it administrator, desktopsites, desktop sites
    
Desktop Sites

MPLS and iDirect Network

Published By: iDirect     Published Date: Aug 21, 2009
The Internet boom continues to grow as more and more businesses, residential and SOHO clients start using the Internet. As service providers begin to scale their networks to accommodate this tripledigit growth, traffic engineering and scalability of the network has been of utmost importance.
Tags : 
soho, soho security, service providers, network scalability, traffic management, network expansion, idirect
    
iDirect

Content Security: Blocking Spam and Unwanted Traffic

Published By: Internet Security Systems     Published Date: Aug 21, 2009
The Internet and email have stimulated huge productivity gains for employees. Workers quickly and easily access volumes of research on the Web and correspond with a mouse click. Unfortunately, businesses taking advantage of these tools are increasingly faced with daily onslaughts of spam and unwanted Web traffic.
Tags : 
content security, internet security, spam, anti-spam, anti spam, email security, web security, internet security systems, it management, anti spyware, anti virus, auditing, security policies, web service security, workforce management, corporate portals, messaging, employee performance, productivity
    
Internet Security Systems

Executive Guide to Web Services Security

Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity, xml, analytical applications, service oriented architecture
    
Reactivity

Best Practices for Mid-Market CRM

Published By: Soffront     Published Date: Aug 21, 2009
In the decade since customer relationship management (CRM) software first appeared on the market, implementation of the enterprise application suite that helps businesses find new customers, retain existing customers and otherwise increase revenues have gained a reputation as being risky ventures, subject to user rejection, cost overruns, and missed deadlines.
Tags : 
crm, customer relationship mangement, crm software, crm application, crm app, customer retention, customer satisfaction, lead generation, cost control, crm implementation, crm deployment, soffront, enterprise applications, business management, customer relationship management, enterprise software, sales & marketing software, contact management
    
Soffront

Intelligent Defense for Enterprise Assets: The Need for Host Intrusion Prevention

Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade, firewalls, internet security, intrusion detection
    
Third Brigade

Making the Transformation to SOA

Published By: webMethods     Published Date: Aug 21, 2009
This white paper explores why service-oriented architecture has emerged as one of the most significant developments in IT, and is followed by an overview of how businesses can make the transformation to service-orientation.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, web methods, webmethods, software development, it management, web service security, database development, web services, web service management
    
webMethods

Software-as-a-Service: An Ideal E-mail Archive Solution for Medium-Size Businesses

Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, backup and recovery, storage management, service oriented architecture, email archiving
    
Mimecast

Threat Vector Series: Email Protection for Midsize Companies

Published By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, email security, encryption, security management, security policies, risk management
    
McAfee Inc
Start   Previous    91 92 93 94 95 96 97 98 99 100 101    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.