dom

Results 451 - 475 of 711Sort Results By: Published Date | Title | Company Name

Unified Email Management for Domino

Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, storage area networks
    
Mimecast

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.

Secure Internet Single Sign-On 101

Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Google's Dominance & the Impact of the Bing-Yahoo! Search Alliance

Published By: SearchIgnite     Published Date: Oct 26, 2010
This report tracked more than 55 billion impressions and more than 1 billion clicks on Google, Yahoo! and MSN/Bing from January 1, 2006 through September 30, 2010.
Tags : 
searchignite, google, bing-yahoo, search alliance, ppc, click-through rates, ctr
    
SearchIgnite

Controlling CRM Costs: A Buyer’s Guide

Published By: SugarCRM     Published Date: Jan 07, 2015
The way companies use and pay for customer relationship management (CRM) software has changed significantly over the past decade. Moving from a predominantly perpetual license-based system, where companies paid a large up-front sum and then smaller annual maintenance fees, CRM software providers are now moving towards monthly or annual subscription fees to access CRM software on the Internet.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM

Brand TLD: Shortcut That Helps Revenue and Search Engine Ranking

Published By: Neustar Registry     Published Date: Oct 03, 2011
A brand Top-Level Domain is the next Internet shift. Learn the four benefits of TLDs that every marketer needs to know: campaign management, brand trust, SEO and ROI, and build & protect my brand.
Tags : 
domain, domains, domain names, new tlds, ntlds, brand marketing, campaign management, cmo
    
Neustar Registry

Building a Business Case: The Value of Owning a Top-Level Domain

Published By: Neustar Registry     Published Date: Oct 17, 2011
The Internet is changing. Learn how applying for your own brand Top-Level Domain (TLD), such as .canon or .hitachi, can help improve natural search, build trust with your customers, and generate revenue through your agent channel.
Tags : 
seo, tlds, brand, community, gtlds, roi, icann, internet regulation
    
Neustar Registry

How to Hire and Work With a PPC Agency

Published By: Hanapin Marketing     Published Date: Jun 03, 2013
Whether you’re hiring a new digital marketing agency or looking to improve your current agency relationship, Hanapin Marketing’s longstanding expertise and reputation as the agency that other agencies turn to can provide you with invaluable knowledge. In this guide to building a healthy agency relationship, Hanapin provides best practices and long-established wisdom about what your agency relationship should look like—including what your agency should be doing, and just as importantly, what you can do to help your agency.
Tags : 
ppc, agency, ppc agency, search marketing agency, ppc management company, ppc manager, hire an agency, agency relationship
    
Hanapin Marketing

Thinking About Hiring a PPC Agency? Get a Comprehensive Guide to Choosing

Published By: Hanapin Marketing     Published Date: Jun 03, 2013
Whether you’re hiring a new digital marketing agency or looking to improve your current agency relationship, Hanapin Marketing’s longstanding expertise and reputation as the agency that other agencies turn to can provide you with invaluable expertise. In this guide to choosing and hiring an effective PPC agency, Hanapin provides best practices and long-established wisdom about what your agency relationship should look like—including what your agency should be doing, and just as importantly, what you can do to help your agency.
Tags : 
ppc, agency, ppc agency, search marketing agency, ppc management company, ppc manager, hire an agency, outsource marketing
    
Hanapin Marketing

HP StoreOnce Extends its Industry Leadership in Deduplication 2.0

Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Apr 11, 2013
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s new B6200 StoreOnce Backup System versus EMC Data Domain.
Tags : 
hp storeonce, leadership, deduplication, industry leadership, emc, data domain, backup system, storeonce
    
Sponsored by HP and Intel® Xeon® processors

HP StoreOnce is "Better Together" with HP Data Protector 7

Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Apr 11, 2013
This paper looks at the benefits to be realized in the combined scenario of HP StoreOnce appliances being used with HP’s own Data Protector 7 backup software while considering the topic of “where” the deduplication occurs.
Tags : 
hp storeonce, leadership, deduplication, industry leadership, emc, data domain, backup system, storeonce
    
Sponsored by HP and Intel® Xeon® processors

Five Best Practices to Strengthen Your Sales Analytics Initiative

Published By: ClearSlide, Inc     Published Date: Feb 25, 2015
As sales transforms to customer engagement-based selling, sales teams are challenged to not only help customers address their problems, but also challenge their current wisdom, driving innovation and differentiation in the market.
Tags : 
sales analytics, best practices, big data, data solutions
    
ClearSlide, Inc

Taking the Sting Out of Java Vulnerabilities

Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
Lumension

Taking the Sting Out of Java Vulnerabilities

Published By: Lumension     Published Date: Aug 25, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
java, software, security, platform, vulnerability
    
Lumension

Mobile is the New Normal for Conducting Business

Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security, business technology
    
Globalscape

Prepare to Respond to Disaster: Leverage IT Process Automation for Disaster Recovery Planning

Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
    
HP

Desktop Transformation: What It Is, Why It Matters, and How to Get Started

Published By: VMware AirWatch     Published Date: Dec 09, 2016
What is desktop transformation? What role can it play in your organization? And what benefits can it deliver to your IT team and your employees? This resource explores these and other questions, as well as a new desktop strategy that can help you streamline operations, improve productivity, enhance security, and give your end users freedom. Access now and you’ll take a look at eight frequently asked questions about desktop transformation and how you can get your project started today.
Tags : 
    
VMware AirWatch

Work 3.0: The Next Generation Model for Smarter Business

Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity, business intelligence
    
Mitel

Data Breaches: Is Prevention Practical? (SANS Report)

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
    
Palo Alto Networks

Empower Your Employees in a Digital World

Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Help your employees achieve their best with integrated, secure technology Thrive in a fast-changing digital world by giving your people the freedom and flexibility to be productive and work together from anywhere, while maintaining security and compliance. Discover how an integrated solution can deliver: Familiar productivity and collaboration tools System and device management Intelligent security The latest version of Windows for the enterprise
Tags : 
    
Microsoft Office 365

Aberdeen Group: Enterprise Strategy Report - Global ERP Functionality Differences

Published By: SAP     Published Date: Mar 29, 2009
While globalization was once the exclusive domain of the large multi-billion dollar companies, today even small to medium size enterprises cannot escape the issues associated with global trade and offshore manufacturing. Whether you view the world as flat or round, it is definitely shrinking. Download this whitepaper to learn more.
Tags : 
sap, globalization, erp, manufacturing, supply chain management, enterprise, enterprise resource planning
    
SAP

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

Blockchain benefits for electronics

Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM

How to Leverage a Big Data Model in the Network Monitoring Domain

Published By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.
Tags : 
networking, big data, network monitoring, optimization, data center, monitoring
    
VSS Monitoring

Gartner eNewsletter: Transforming Logistics

Published By: Oracle     Published Date: Apr 28, 2014
Perfect order fulfillment requires companies to have seamless integration of all supply chain execution (SCE) including, logistics processes from manufacturing, transportation, warehouse, global trade to mobile and RFID. Recent research from Gartner reveals that most supply chain organizations continue to operate as functional silos – warehousing, transportation and manufacturing – with minimal, if any, process integration and synchronization between execution silos. The Gartner Research report provides key insights into how supply chain and IT leaders can transform logistics by breaking down functional silos, and designing business processes that span, optimize and synchronize across traditional functional domains.
Tags : 
oracle, logistics, value chain execution, silos
    
Oracle
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.