site pro

Results 551 - 575 of 577Sort Results By: Published Date | Title | Company Name

Maximizing Uptime for Mission-Critical File Transfers: Availability and Scalability for Managed File

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla, ha cluster, high availability, load balancer, mission-critical transfers, active/passive, edi, it management, content management system, information management, secure content management
    
Globalscape

Adobe Digital Index: Best of the Best Benchmark 2014

Published By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : 
online marketing, marketing practices, mobile usage trends
    
Adobe

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

ES WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec

BR Vulnerability Assessment 2013

Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec

Digital Body Language: Reading and Responding to Your Prospects’ Digital Buying Behavior

Published By: Oracle     Published Date: Sep 05, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World"
Tags : 
digital, body language, sales, responses, transactions, b2b, body language, downloads, engagement, business, climate, product, solution
    
Oracle

The New Industrial Innovation: Emotion

Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Showing a softer side of manufacturing is winning over executives, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the standard manufacturing marketing approach would indicate that hard elements are more compelling, this new research suggests that the opposite is true: A significant majority of business leaders are moving to a more innate approach to decision-making, trusting their gut and relying on “soft” factors, such as company culture, reputation and level of trust, to help them make decisions.
Tags : 
    
Tyco Integrated Security

Disaster Recovery in the Cloud Enables You to Protect More Data, More Economically

Published By: NetApp     Published Date: Mar 05, 2018
Disaster recovery (DR) from remote sites with dedicated servers, storage, and networking gear has long been a best practice for mission-critical applications. However, other applications and data have often gone unprotected due to the costs required for redundant DR assets that are seldom, if ever, utilized. The ability to move DR to the cloud has changed the picture and enabled IT organizations to build more robust DR strategies than had been possible in the past.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

SEO 101: The Basics (And Beyond)

Published By: Maxaudience     Published Date: Oct 12, 2015
Over the last 12 years, a massive amount of material has been written about Search Engine Optimization (SEO). The majority of the information is acceptable, but there’s a lot of dated information still being promoted as best practices (exact match domain names, keyword density targets, exact anchor text, and so on). In this eBook, you’ll learn the current best practices in SEO that companies of all sizes can use to increase site visibility and the number of visitors coming to your site, and most importantly, improve conversion rates.
Tags : 
seo, domain names, keyword density targets, exact anchor text, site visibility, number of visitors, conversion rates
    
Maxaudience

Survival of the Fastest in the Cloud

Published By: Oracle     Published Date: Oct 29, 2015
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle

Technologies Which Can Support And Greatly Facilitate Key Stages of Remediation

Published By: Thomson Reuters     Published Date: Mar 08, 2018
Although AI and big data have delivered advances in technology these past years which make remediation more manageable and more efficient, it’s important ensure that the solution you select, meets your particular requirements, addresses and meets your needs. Some jurisdictions require technology dealing with certain types of data to be hosted on-site; data hosting, exchange, protection and privacy can all affect the choice of solution or vendor. It’s common for companies to call out these specifics in their RFPs. Other considerations include the level of precision and recall (e.g., the accuracy) required to meet project needs, the setup time for a system, its implementation and the ability to support globally dispersed team members.
Tags : 
technology, financial, sector, database, thomson, reuters
    
Thomson Reuters

Detecting Sophisticated Bots with Bot Manager Premier

Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies

Top 10 Considerations for Bot Management

Published By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies

DocuSign for Life Sciences eBook

Published By: DocuSign     Published Date: Apr 24, 2018
We live in a mobile, digital era where health information is at our fingertips. With the touch of a button, patients can see test results, track prescriptions, and sign up for clinical research. And yet it still takes over a decade to bring breakthrough treatments to market. Scientific productivity must improve: clinical trials are costly and time-consuming, and regulations mandate increased scrutiny and compliance. The patients who rely on your scientific leadership are expecting more. How are you meeting their needs? While intensive research and study are still a prerequisite for success, there is a better way to develop new products and therapies. Download the eBook for best practices to drive digital adoption in life sciences.
Tags : 
    
DocuSign

Candidate Experience: Maintaining Consistency from Application to Onboarding

Published By: IBM     Published Date: Jul 20, 2016
Attracting today’s savvy candidate requires much more than a creative job description and a flattering email message. The transparency provided by web sites such as Glassdoor combined with a millennial desire for meaningful work and corporate responsibility have the upped the ante when it comes to employer brand and candidate experience. While many firms have good intentions when it comes to employer brand, these intentions aren’t always translated to action, leaving many candidates feeling frustrated as they move through the process. New hires need confirmation that everything they were told in the interview processes is not only accurate, but even better than expected. When the onboarding process falls short of those expectations, candidates immediately question their decision to accept the offer and retention efforts in jeopardy. Join this webcast to learn how to avoid costly new-hire attrition in your organization.
Tags : 
ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters, candidate experience, human resource technology
    
IBM

VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection. How automated or
Tags : 
    
AWS

Fighting Fraud with Intelligent Access Management

Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM

The Ultimate Guide to Multisite Management

Published By: Progress     Published Date: Jan 22, 2019
"The “Ultimate Guide for Multisite Management” offers tips and guidance about how: companies of all types benefit from multisite management, how multisite management reduces costs, improves process and ensures consistency and the proper set-up of multisite management can yield best results. "
Tags : 
    
Progress

AutoWeb: How Oath Can Drive Success Via Multiple Routes

Published By: Oath     Published Date: Nov 15, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath

AutoWeb: How Oath Can Drive Success Via Multiple Routes

Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath

11 Secrets to Amazon Success

Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazon’s ever-evolving trends and requirements, you must also take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, we’ll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more.
Tags : 
    
ChannelAdvisor

The Manufacturer's Guide to Marketplace Selling

Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"Whether you call yourself a company, brand, brand manufacturer, manufacturer, wholesaler, branded manufacturer or one of the other myriad of categorizations out there, there’s never been a better time to focus on direct-to-consumer (D2C) marketplaces as part of your go-to market strategy. Some 60% of consumers are already visiting your website instead of your retailers’ sites, and more than half will opt to buy directly from brand manufacturers when given the option. After years of relying on marketplaces to handle so many mission-critical activities, it can be challenging to build a successful D2C model that thoroughly addresses them all. This process will require a new way of thinking for you, a cultural shift for your employees and a lot of logistics for everyone involved. But how can you know when it’s time to start selling on e-commerce marketplaces? While the benefits of transitioning to a D2C marketplace model are undeniable, it also requires a significant investment of time
Tags : 
    
ChannelAdvisor

The truth about information governance and the cloud

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Chatter about the cloud is everywhere. You can't turn on your TV, look at your smartphone, open a magazine or browse websites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, create a way to manage hard drive space on your phone and much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers.
Tags : 
    
Group M_IBM Q418

Complete Website Security Brochure

Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert

The High Cost of Poor Website Security

Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.