lte

Results 326 - 350 of 964Sort Results By: Published Date | Title | Company Name

Email as Intellectual Property: The Need for Suitable Management

Published By: Quocirca     Published Date: Nov 09, 2006
Growth in overall email volume (driven by more sophisticated spamming attacks), the need to filter out malware, and ensuring suitable content for purpose means that we now must re-address how we view email within the organization.
Tags : 
email security, it management, malware, email communications, internet security, anti spam, anti-spam, spam, antispam, quocirca, content delivery, information management
    
Quocirca

Email Deliverability in the Age of Spam

Published By: GetActive Software     Published Date: Jan 23, 2007
Nonprofit organizations of all sizes are facing considerable challenges as they reach out to their supporters using email. Learn how to overcome these challenges and connect with your customer with a minimum of filtering and blocking.
Tags : 
email marketing, deliverability
    
GetActive Software

Email Design Best Practices

Published By: Bronto     Published Date: Jan 03, 2013
In light of the increasing use of preview panes, filters and the default blocking of images in popular email clients such as Outlook, Gmail and AOL, Bronto has outlined design best practices that will help you successfully reach your audience.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto

Email Encryption for InterScan Messaging Hosted Security

Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering, anti spam, anti spyware
    
Trend Micro SaaS

Email Insider Threat Prevention

Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems

Email is a useful tool for communication but not the answer to collaborating and increasing producti

Published By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload, email security, content management system, email archiving
    
4Retail

EMAIL-ARCHIVIERUNG ALLES WAS RECHT IST

Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint

EMail-Archivierung – alles, was Recht ist

Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint

eMarketer's top digital trends for 2012 and beyond

Published By: Adobe     Published Date: Jun 29, 2012
Where should you be advertising in 2012? How will consumer behavior change the way you interact with your audience? What mobile trends will impact you most this year? Marketers, retailer, content owners and technology firms are more focused than ever on obtaining results from investments in digital marketing. If past years were about amassing data from the touch points between companies, 2012 will be about curating, filtering and measuring that information to drive outcomes.
Tags : 
adobe, marketing, emarketer, digital trends, digital marketing, advertising
    
Adobe

EMC ScaleIO: An Ideal Storage Foundation for Oracle RAC

Published By: EMC Corporation     Published Date: Dec 01, 2014
EMC ScaleIO offers a cost-efficient, blazing-fast and scalable Oracle RAC alternative to Exadata. With ScaleIO, you can take advantage of a platform for high-performance parallel database operation on commodity hardware, with an enterprise-grade feature set, at a much lower cost.
Tags : 
storage foundation, cost-efficient, scalable, database operation, data center
    
EMC Corporation

Employee Wellness and the Next Generation of Workplace Benefits

Published By: Tharpe Robbins     Published Date: Jun 23, 2014
Looking for cost-effective benefit alternatives that increase productivity and reduce absenteeism? It’s time to look at workplace wellness programs. These programs are no longer a trend — they are here to stay. Providing employees with incentives to get healthy and stay healthy can have a positive impact on engagement and the bottom line. This white paper from TharpeRobbins shows you the advantages of an employee wellness program and how you can get started with one in your organization.
Tags : 
employee engagement, rewards, awards, recognition, performance recognition, length of service recognition, organization performance, attract talent, retention, social recognition, sales performance, career recognition, retirement recognition, employee incentives, recognition software, engagement platform, career, performance, social, service award
    
Tharpe Robbins

Empowering Your Mobile Worker

Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, wireless
    
Box

End User Computing and Virtual Desktop Infrastructure Solutions

Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Everything you need to know about Infrastructure for Desktop Virtualization—in one eBook. Dive into this extensive eBook to get all the details you need to consider when launching down the path of virtualization. In this eBook, from Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and editor Sachin Chheda, director of solutions and verticals marketing at Nutanix, we provide detailed analysis and key points to consider, including: • Architectural Principles • Building Blocks • Infrastructure Alternatives • Storage Requirements • Compute Sizing Get the eBook
Tags : 
infrastructure, capacity, monitoring, storage requirements, compute sizing, scalability, business technology
    
Lenovo and Intel®

End-To-End Server Security: The IT Leader's Guide

Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell

End-To-End Server Security: The IT Leader's Guide

Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC

Enterprise Imaging Accelerated On Pure

Published By: Pure Storage     Published Date: Nov 02, 2017
Health systems moving to integrated care business models are crying out for more active repositories to replace image archives as they move toward collaborative models of care. Yet traditional storage vendors continue to rely on three-year buying models and costly forklift migrations – and performance still does not meet clinician’s requirements. Pure Storage offers an alternative: a renewable, upgradable, scale-out, highperformance storage environment for images at a low TCO that ensures the latest technology and marketleading support and maintenance for 10+ years.
Tags : 
health systems, pure storage, enterprise, performance, marketleading, vendors
    
Pure Storage

Enterprise-Datenmanagement Neu Erfunden: Eine 360-Grad-Sicht

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Unternehmen generieren, sammeln und speichern eine stetig wachsende Menge an Daten in einer Vielzahl unterschiedlicher Systeme. Es liegt daher auf der Hand, dass sie einen neuen Ansatz für das Datenmanagement benötigen, um nicht nur die Kosten in Zaum zu halten, sondern auch sicherzustellen, dass die Daten jederzeit und an jedem Ort verfügbar sind.
Tags : 
enterprise, datenmanagement, eine360, grad, sicht
    
AstuteIT_ABM_EMEA

Enterprise-Datenmanagement Neu Erfunden: Eine 360-Grad-Sicht

Published By: Astute IT DACH     Published Date: Feb 28, 2018
Unternehmen generieren, sammeln und speichern eine stetig wachsende Menge an Daten in einer Vielzahl unterschiedlicher Systeme. Es liegt daher auf der Hand, dass sie einen neuen Ansatz für das Datenmanagement benötigen, um nicht nur die Kosten in Zaum zu halten, sondern auch sicherzustellen, dass die Daten jederzeit und an jedem Ort verfügbar sind.
Tags : 
enterprise, datenmanagement, eine360, grad, sicht
    
Astute IT DACH

EqualLogic PS Series with VMware - virtual Servers Meet Virtual Storage

Published By: Dell Storage     Published Date: Jan 16, 2009
EqualLogic provides storage virtualization features with its award-winning PS Series arrays, offering higher storage utilization rates than alternative solutions. By combining PS Series arrays with VMware, IT administrators achieve virtualized environments with fewer servers and less wasted space.
Tags : 
dell, equallogic ps series, vmware, virtual servers, virtual storage, virtualized environments, storage, storage area networks, storage management, storage virtualization
    
Dell Storage

Erfahren Sie, wie IBM sein Vertriebsteam mit Sugar transformiert hat.

Published By: SugarCRM     Published Date: May 13, 2014
IBM nutzte das einzigartige, nutzerfokussierte CRM-System Sugar, um seine globale Vertriebsorganisation neu zu gestalten. Es wurde eine neue Lösung für Vertriebsrepräsentanten eingeführt, die weltweit Millionen von Opportunities verwalten. Lesen Sie in der Analyse von Ovum, einem führenden Technologie-Research-Unternehmen, wie IBM diese Herkulesaufgabe in Rekordzeit umsetzte.
Tags : 
ibm, crm, ovum, sugar, global sales organization, sugarcrm, success, it management, enterprise applications
    
SugarCRM

ERFÜLLEN SIE DIE HEUTIGEN ANFORDERUNGEN IM MOBILBEREICH?

Published By: Akamai Technologies     Published Date: Aug 17, 2017
DANK DER RASANTEN ANPASSUNG DES INTERNETS AN MOBILE ANFORDERUNGEN erhalten Mobilnutzer heutzutage jederzeit und überall nahezu uneingeschränkten Zugriff auf Daten und Informationen. Nutzer, die permanent mit dem Internet verbunden sind, bieten Unternehmen eine hervorragende Möglichkeit, ihre Umsätze sowie die Kundeninteraktion und Kundenbindung zu steigern. Gleichzeitig ergeben sich dadurch jedoch völlig neue Herausforderungen bei der Bereitstellung mobiler Inhalte. In diesem E-Book werden wir diese Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, mobile Anwendungen und mobile Websites meistern. Hätten Sie das gedacht?
Tags : 
    
Akamai Technologies

Erfüllen Sie die heutigen Anforderungen im Mobilbereich?

Published By: Akamai Technologies     Published Date: May 24, 2017
Nutzer von Mobilgeräten sind heutzutage verwöhnt. Sie erwarten, dass ihnen ansprechende Inhalte blitzschnell und optimiert auf ihrem Mobilgerät bereitgestellt werden – und das noch in der gleichen Qualität wie auf dem Desktop-PC. Einerseits stellen diese permanent mit dem Internet verbundenen Nutzer eine hervorragende Geschäftschance dar. Andererseits müssen Unternehmen komplexe Herausforderungen meistern, um solch hohen Nutzererwartungen bei der mobilen Bereitstellung gerecht zu werden. In diesem E-Book werden wir drei dieser Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, Apps und mobile Websites meistern. So lassen sich Umsätze sowie die Kundeninteraktion und Kundenbindung steigern. Laden Sie das E-Book heute noch herunter, um zu erfahren, wie Ihr Unternehmen die heutigen Anforderungen im Mobilbereich erfüllen kann.
Tags : 
    
Akamai Technologies

Erschließung des vollen CRM-Potenzials durch das Individuum

Published By: SugarCRM     Published Date: Feb 21, 2014
Customer Relationship Management Software wird seit über 20 Jahren von Organisationen jeder Art und Größe genutzt. Allerdings entfalten nur wenige davon das wahre Potenzial von CRM. Erfahren Sie, wie CRM mit dem Fokus auf das Individuum Ihr gesamtes Geschäft transformieren kann.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, customer relationship management
    
SugarCRM

Erstellen einer Social-Content-Strategie

Published By: Falcon Social     Published Date: Oct 30, 2015
Du willst eine Strategie entwickeln, die Engagement fördert und deine Marke in den sozialen Medien aufbaut? Dieses Handbuch unterstützt dich dabei, eine Strategie zu erstellen, die den gesamten Lebenszyklus deiner Inhalte abdeckt – von der Planung und Ideensuche bis hin zur Erfolgsmessung und Optimierung. Lade das Handbuch jetzt herunter.
Tags : 
social media tool, social media management tool, social media verwaltung, social media software, social media marketing, social media campaigns, content marketing, social media content, content marketing tool, content marketing software
    
Falcon Social

ERSTELLEN SIE EIN GESCHÄFTSSZENARIO

Published By: Juniper Networks     Published Date: Jan 11, 2016
Wenn Sie erfahren möchten, wie die Agilität des Unternehmens und der Netzwerkarchitektur gesteigert werden kann, sollten Sie sich unser White Paper zum Thema Virtualisierung und Unternehmen herunterladen. Finden Sie heraus, wie Ihr Netzwerk ein neues Niveau in Sachen Leistung und Ausfallsicherheit erreichen kann.
Tags : 
    
Juniper Networks
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.