game

Results 51 - 75 of 362Sort Results By: Published Date | Title | Company Name

Building a Private Cloud Cisco and Microsoft — Optimized Infrastructure Strategies

Published By: Cisco     Published Date: Mar 04, 2015
When it comes to game-changing infrastructure technologies, private clouds are leading the way toward new IT efficiencies and a simplified means of consumption. Building on their roots as virtualized data centers, private clouds are rapidly moving up the list of must-have technologies to become an architectural standard for IT organizations around the world.
Tags : 
    
Cisco

Small Business Security Essentials - Stay ahead of the game on security

Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
security, cyber threat, cisco
    
Cisco EMEA

The Virtual Presenter's Series: Start Right. Design Right. Present Right.

Published By: Citrix Online     Published Date: Sep 03, 2009
Presenting online is a completely different ballgame from presenting in person. Sure, you don't have to fret about what to wear or if you're going to trip on stage, but you do have to worry about how to engage, interact, involve and understand your audience; all while you cannot even see them!
Tags : 
webinar, web analytics, lead generation, leads, sales, conversion, conversion rate, citrix
    
Citrix Online

5 Security Tips to Help You Work On Your Personal Device (Accounting)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile

5 Security Tips to Help You Work On Your Personal Device (Finance)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device (Healthcare)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, cloud security, data storage, network security, device protection, information protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
cloud initiative, personal security, personal device, password protection, security, data encryption
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

5 Security Tips to Help Accountants Work From Anywhere (Accounting)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile

5 Security Tips to Help Financial Services Professionals Work From Anywhere (Finance)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device (Healthcare)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
healthcare, mobility, data security, security tips, personal device
    
Citrix ShareFile

Citrix Networking solution brief

Published By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
    
Citrix Systems

Citrix Networking Solution Brief

Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems

Case Study: WestLotto reduces backup and recovery times by up to 98%

Published By: Cohesity     Published Date: Aug 21, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions.
Tags : 
    
Cohesity

Case Study: WestLotto reduces backup and recovery times by up to 98%

Published By: Cohesity     Published Date: Aug 24, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions. Download this case study to find out how WestLotto reduced backup and recovery times by up to 98% with Cohesity’s hyperconverged secondary storage system.
Tags : 
    
Cohesity

Top 10 Data Protection Time Wasters

Published By: Commvault     Published Date: Jul 06, 2016
Efficiency is the name of the game. But is your IT organization winning or losing? Read more to learn how your IT organization is wasting time and energy protecting data.
Tags : 
commvault, data protection, time management, de-duplication, backup efficiency, snapshot technology, productivity, comprehensive reporting
    
Commvault

5 Steps to Creating a Memorable Sales Experience

Published By: ConnectWise     Published Date: Aug 22, 2019
Profits are the name of the game for a lot of technology solution providers, but keeping them coming in the door isn’t always simple. Building a solid foundation starts with a strong, efficient sales team. This eBook helps outline the five keys to creating and maintaining a well-oiled sales machine that allows you to bring in more business and encourage recurring revenue from your existing clients.
Tags : 
    
ConnectWise

Up Your Marketing Game: A Digital Agency’s Guide to Integrated Campaigns

Published By: Constant Contact     Published Date: Mar 10, 2016
The average consumer goes through 6 channels before they make a purchase decision. You and your small business clients know that a multi-channel approach is a must to reach them, but how do you make your campaign work smarter and harder? Find out!
Tags : 
marketing, digital agency, campaigns, multi-channel approach, constant contact, application integration, application performance management, best practices
    
Constant Contact

Winning the SaaS Game with Hyperconnected Colocation

Published By: CoreSite     Published Date: May 12, 2019
This new guide from CoreSite will highlight the challenges your SaaS organization faces in a competitive landscape.
Tags : 
coresite, colocation, cloud saas, saas, cloud infrastructure, hyperconnected colocation, infrastructure, data integration
    
CoreSite

Win the Recruiting Game with an Airtight Action Plan

Published By: Cornerstone OnDemand     Published Date: May 15, 2015
Download this eBook to learn how companies can quickly fill open positions with the highest quality talent possible.
Tags : 
recruiting, talent, job openings, job applicants, time-to-hire
    
Cornerstone OnDemand

The Coaching Playbook: Your Must-Have Game Plan for Maximizing Employee Performance

Published By: Cornerstone OnDemand     Published Date: Jul 15, 2015
The new white paper, The Coaching Playbook, provides you with an in-depth breakdown on how coaching improves employee performance at every level of your company, as well as what to look for in a coach, and most importantly, how it benefits your bottom line.
Tags : 
employee coaching, employee performance, bottom line, mentoring, employee goals, skills, strategy
    
Cornerstone OnDemand

The Rise of a Holistic Learning Experience

Published By: Cornerstone OnDemand     Published Date: Apr 16, 2018
The role of learning and development has never been more important to the success of small and medium businesses, especially because of the fierce competition with big business to attract and retain top talent. We’re amidst a disruption in the way employees work and learn. Technology, skills, and workforce demographics are shifting and evolving at a rapid pace. Employees are now sitting in the driver’s seat when it comes to their career path and companies are getting strategic with how to meet this new demand. Read our guide “The Rise of the Holistic Learning Experience” to learn how the new role of learning and development can help your company thrive. You’ll gain insights on: • Consumer-driven technology changing the game • Continuous learning and staying relevant amid change • The holistic learner experience Get your copy and start building a holistic learning program today.
Tags : 
    
Cornerstone OnDemand
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.