online content

Results 126 - 132 of 132Sort Results By: Published Date | Title | Company Name

Emerging Technologies B2B CMOs Should Watch in 2011

Published By: TimeTrade Systems Inc.     Published Date: Apr 21, 2011
Business-to-business CMOs need to stay current on emerging technologies that improve customer engagement. This Forrester Research report overviews new technologies marketers us to improve customer acquisition and engagement at different stages of the customer life cycle.
Tags : 
b2b marketing, marketing tools, lead generation, marketing technology, website conversion, timetrade, forrester, jeff ernst, david m. cooperstein, matthew dernoga, online content curation, social intelligence, b2b cmos, marketing leadership
    
TimeTrade Systems Inc.

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

Protect Your Brand, Protect Your Customers

Published By: ttec     Published Date: Jul 24, 2019
Fraud prevention and content moderation take center stage. Trust & Safety is good business Change your password often. Keep your virus software up to date. Beware of so-called princes from Nigeria. These are the costs of doing business online. Since its inception, the internet has always had its share of bad guys. And as nearly all companies move to a more digitally enabled world, the thieves, con artists, and hackers are finding new ways to steal money, information, and disrupt the world in a bad way. Having a trustworthy and safe brand is now a differentiator, especially from companies that operate primarily online. But itís becoming harder to keep up as technology advances and information moves quicker every day. This eBook details how companies can protect their brand and keep customers safe by enabling fraud prevention and content moderation strategies and tactics.
Tags : 
    
ttec

Cyber-bullying: A Digital Epidemic

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor, application security, web service security, content management system, messaging, secure content management
    
WatchGuard Technologies

Real Results Report: Health Services Organizations Comply with HIPAA Using WebEx

Published By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : 
online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings, webinars, hipaa compliance, ensure compliance, system rollout, community education, community programs, webex, remote access, compliance, collaboration
    
WebEx Communications

White Paper: Top 10 Tips for Effective Online Lead Generation in 2010

Published By: WinGreen Marketing Systems     Published Date: Aug 11, 2010
White paper detailing the top ten tips for generating sales leads and building pipeline through online lead generation methods.
Tags : 
marketing, lead generation, sales, salesforce, salesforce.com, online lead generation, online marketing, demand generation, digital marketing, content marketing, email marketing
    
WinGreen Marketing Systems
Start   Previous    1 2 3 4 5 6     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.