grow

Results 326 - 350 of 3654Sort Results By: Published Date | Title | Company Name

Chemistry at the Heart of Business Success

Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions, application security, authentication
    
Kaspersky Lab Australia and New Zealand

The Seven Deadly Sins of Distribution Expense Control

Published By: International Business Systems (IBS)     Published Date: Aug 30, 2011
Revenue may be the sexy side of business, but reducing operating expenses is critical. It's no good growing your sales if the profits are leaking out
Tags : 
distribution logistics, distribution management, wholesale distribution, distribution resource management, supply chain management, erp, enterprise, resource
    
International Business Systems (IBS)

Ovum White Paper

Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco

Remote Access and Security Challenges & Opportunities

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies

5 Reasons Enterprises Need a New Access Model

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies

Identity-Based Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.
Tags : 
identity-based security, business protection, identity, security solutions, new trends to secure business, access control, application security, authentication
    
CA Technologies

So You’re Considering a Sale of Your Business – Now What?

Published By: KeyBanc Capital Markets     Published Date: Nov 12, 2015
Private equity and investment banking experts share observations on what a distribution company owner can expect when preparing to sell a stake in the company, and how to prepare the business to attract potential buyers’ attention and maximize the price it can command.
Tags : 
industrial distribution, industrial distribution business owner, selling a business, private equity, financial sponsor, financial investor, strategic partner, growth strategy
    
KeyBanc Capital Markets

Mobile Security: Confidence Ebbs as BYOD Booms

Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell

Entrepreneurship Is Risky Business - How to Avoid 10 Pitfalls

Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet

What is a PEO? An introduction to the PEO model and its benefits for small and medium-sized business

Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market
    
TriNet

Supporting Startup Growth with the New Recruiting Ecosystem

Published By: TriNet     Published Date: Apr 23, 2012
Download this report to learn about success stories and recommendations on how to take full advantage of innovative technology to help your efforts to attract and retain top talent.
Tags : 
ecosystem, employers, recruiting, streamline, democratic, scientific, professional, networks
    
TriNet

Entrepreneurship Is Risky Business - How to Avoid 10 Pitfalls

Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet

Opportunities & Challenges of Social Media in the Workplace

Published By: TriNet     Published Date: Nov 26, 2012
Download this white paper for insights on specific techniques startups and growing businesses can use to leverage the benefits and avoid the pitfalls of social media.
Tags : 
social media, employee engagement, social media policy, social networking, business technology
    
TriNet

Hyper Converged Infrastructure Appliances for Private Cloud

Published By: Dell     Published Date: May 04, 2015
short report discussing the growth and use of news converged infrastructure solutions for private cloud.
Tags : 
    
Dell

Are You Meeting Today's Mobile Mandate?

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : 
mobile, mobile adoption, customer loyalty, always on
    
Akamai Technologies

Maps and Navigation Apps: How Discovery, Exploration Features Open Up Ad Opportunities

Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies

What’s on the minds of middle market leaders? Turn to KeyBank to find out.

Published By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : 
middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion
    
KeyBank Commercial Banking

Identity theft, fraud and your wealth. How you can stay protected.

Published By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing
    
Key Private Bank

2016 Annual Security Report

Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco

Boost Productivity for small and midsize Businesses with HP ProLiant Gen9 servers

Published By: HP     Published Date: Mar 23, 2015
Increase productivity for small and midsize business with HP ProLiant Gen9 servers. Today, business executives are seeking ways to become more productive so that they can deliver new products and services faster, increase operational efficiencies, grow revenue, increase margin and gain market share. Increasing the productivity of IT resources and staff is critical for their success. New innovations now make it possible for small and midsize businesses (SMB) to leverage the performance and efficiencies that were once only affordable by large enterprises. Businesses of all sizes face similar issues as they look to grow their business efficiently.
Tags : 
    
HP

HP Proliant Gen9: Performance meets efficiency eBook - English

Published By: HP     Published Date: Dec 05, 2014
Delivering high-quality services with greater speed and efficiency is one of the greatest pressures facing your information technology (IT) infrastructure. The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success. Traditional, siloed IT infrastructures are often too labor intensive, inefficient, and slow to overcome these challenges. Organizations need a converged, cloud-ready, software defined infrastructure to help them meet the evolving demands of their business.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
    
HP

Secure Access and Continuity in a Virtualized and BYOD World whitepaper

Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors
    
HPE

Protecting Technology Infra: Importance of Secure Access and Continuity Sol

Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors
    
HPE
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.