text

Results 326 - 350 of 713Sort Results By: Published Date | Title | Company Name

Falcon Discover AWS Solution Brief Report

Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA

Motorola Solutions Wave Two-Way Radio: The Power of Nationwide Push-to-Talk

Published By: Motorola Solutions     Published Date: Apr 26, 2019
We live in an always on, instantly connected world. Just text, email, IM, or direct message to communicate with anyone, anywhere.
Tags : 
    
Motorola Solutions

Welcome to the Communication Nation

Published By: Motorola Solutions     Published Date: Aug 14, 2019
We live in a data-driven world where businesses increasingly expect data to flood through their networks at optimum speeds to do their jobs better, smarter, and faster. Today, 75% of the workplace is said to be the millennial generation(1), and many believe that millennial workers are addicted to the “instant gratification” phenomenon. This is a generation that grew up with texting, instant messaging, social media, and more, all at their service to deliver conversations and information in an instant. As the speed of our data-driven world continues to increase, so are the expectations of workers whose jobs rely on instant data-driven communications.
Tags : 
    
Motorola Solutions

La paie en France : Priorités, attentes & niveau de satisfaction

Published By: Workday France     Published Date: Aug 03, 2018
La révolution numérique bouscule nos modes de vie, nos façons de travailler, nos modes de communication. Dans ce contexte de digitalisation, le CXP et Workday ont souhaité réaliser un état des lieux concernant les systèmes de paie et leur utilisation. Cette étude* identifie les priorités des entreprises, leurs attentes et le niveau de satisfaction vis-à-vis de leurs solutions de paie ainsi que l’exploitation des données qui en est faite.
Tags : 
    
Workday France

Mobile & Social Technologies for Tobacco Cessation: Do They Work?

Published By: Alere Wellbeing     Published Date: Oct 18, 2011
Learn about new technologies for tobacco cessation and how they can effect real, measurable behavior change in the tobacco users at your organization - and save you from excess healthcare costs.
Tags : 
tobacco cessation benefit, text to quit, quit smoking app, wellness program, specialized program, quitting tobacco, nicotine addiction, specialized treatment
    
Alere Wellbeing

Gartner Newsletter: Prioritize and Remediate Active Vulnerabilities Impacting Your Network

Published By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
    
Trend Micro

Managed Document Services: A Business Primer

Published By: Kyocera EMEA     Published Date: Mar 18, 2015
This White Paper explores the context in which Managed Document Services has gained traction among business leaders and gives the best tips on evaluating the viability of an MDS deployment in your organisation.
Tags : 
document management, mds, managed document services, documents outputs, documents at work, printed and digital documents, mds solutions, kyocera
    
Kyocera EMEA

Advanced Scanning Solutions and the Migration to Digital Learning

Published By: Brother     Published Date: Nov 23, 2015
The Center for Digital Education (CDE) surveyed over 130 K-12 decision-makers on the classroom use of printer and scanner technologies in September 2014 and found scanning materials for digital use in the classroom is a key concern, with ease of use, cost containment and flexible deployment among the most critical needs. In the context of this study, this white paper will build a case for the use of scanners to revolutionize K-12 teaching, learning and administration.
Tags : 
scanners, brother, scanning solution, digital learning, touchscreen, education technology, it management, business technology
    
Brother

Monitoring Enterprise-wide Business Risk

Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs
    
ArcSight

Consumers Say They're More Likely to Open Envelopes with Color Text and Graphics on the Front

Published By: PitneyBowes     Published Date: Sep 29, 2010
Recent study suggests that a new technology can capture increased consumer attention for a modest incremental cost (open-ability research).
Tags : 
pitney bowes, open envelopes, color text, graphic, mailing, business management, customer service
    
PitneyBowes

Customer Experience Management

Published By: OpenText     Published Date: Mar 20, 2012
The report highlights industry best practices for establishing and nurturing CEM programs that delight customers while improving overall business results.
Tags : 
marketing, customer experience, customer satisfaction, analytics, customer service, aberdeen
    
OpenText

How to Create Measurable Value from Today's Digital Environment

Published By: OpenText     Published Date: Mar 20, 2012
In this paper we'll look at the trends driving online marketing and show how an online marketing solution can help marketing executives achieve their three most important objectives.
Tags : 
marketing, opentext, online marketing, digital marketing, marketing trends, digital, online marketing
    
OpenText

Multi-Channel Digital Marketing

Published By: OpenText     Published Date: Mar 22, 2012
This Aberdeen Analyst Insight highlights the value and strategic deployment methods of multi-channel customer engagement programs (i.e. marketing) that use digital channels.
Tags : 
digital marketing, marketing, multi-channel marketing, online marketing
    
OpenText

Social Compliance: Protect Brand Equity and Ensure Governance, by the Aberdeen Group

Published By: OpenText     Published Date: May 23, 2012
Download this report and learn how to: . Monitor, analyze and report on social media content . Manage brand effectiveness . Ensure brand consistency across social media and other marketing channels . Build an effective social compliance program
Tags : 
brand equity, governance, social media, social compliance, brand consistency, brand effectiveness
    
OpenText

The Business Value of Adapting Web Content for Mobile Devices, by the Aberdeen Groups

Published By: OpenText     Published Date: May 23, 2012
Download this report and discover: . Positive impact of mobile web content optimization on customer engagement . Key success factors for building mobile websites that delight customers while contributing to top-line revenue results
Tags : 
mobile marketing, web content optimization, metric-driven mobile marketing, pinch-zooming, mobile user engagement, mobile user experience
    
OpenText

Why Managing Your Brand is More Important Than Ever

Published By: OpenText     Published Date: Jun 06, 2012
In this paper, we look at the threats to a company's brand, which are especially acute in a world of globalization, multinational corporations, Internet commerce, social media, and electronic file sharing.
Tags : 
marketing, branding, opentext, social media, emerging marketing
    
OpenText

Leveraging Web Content Management for Improved Online Marketing

Published By: OpenText     Published Date: Jun 06, 2012
Content is key to the customer experience, yet digital content strategies at many organizations do not maximize the value of their content across online and offline channels.
Tags : 
web content, marketing, online marketing, digital marketing, opentext, web analytics
    
OpenText

Virtualization reduces costs and complexity for mid-sized businesses

Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, application performance management
    
IBM MidMarket Demand Generation

IPMI Vulnerabilities: Don’t Panic, but Do Take Action : A CDW Blog

Published By: CDW     Published Date: Jul 11, 2013
In the context of these current vulnerability announcements, there is definite cause for concern: vulnerable systems are widespread, they can be exploited remotely, and the exploitation itself seems relatively simple. This means that we likely have only a short window of time before attacks become widespread.
Tags : 
cdw, cdw blog, ipmi, business intelligence, it management
    
CDW

Consumer Insights on Vine Vs Instagram Debate

Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn the results from contextual analysis of millions of social media conversations surrounding Vine before and after the launch of Instagram video.
Tags : 
instagram, vine, consumer insights, online conversation, mobile video sharing, social media analysis
    
Crimson Hexagon

Forget the Critics. What Is the Social Media Conversation?

Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this paper to learn how Crimson Hexagon performed contextual analysis of millions of social media conversations surrounding The Great Gatsby to find out exactly what people are saying about it on Twitter.
Tags : 
online conversation, social media conversation, twitter
    
Crimson Hexagon

Gartner Magic Quadrant for Content-Aware Data Loss Prevention

Published By: McAfee     Published Date: Jan 23, 2013
DLP solutions must move beyond simple keyword matching and regular expressions. Learn how Gartner evaluates DLP providers and why McAfee is again a leader in the 2013 Gartner MQ for Content-Aware DLP.
Tags : 
dlp, data loss prevention, content-aware dlp, context-aware dlp, disaster recovery, encryption, security management, best practices
    
McAfee

Low Hanging Fruit: Immediate Benefits From Data Loss Prevention

Published By: McAfee     Published Date: Jan 23, 2013
This report guides you through some quick and easy steps you can take for major security gains without wasting productivity or important resources.
Tags : 
dlp, data loss prevention, content-aware dlp, context-aware dlp, business continuity, disaster recovery, vulnerability management
    
McAfee

Information Security is Becoming a Big Data Analytics Problem

Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
    
McAfee

Strong Security with Lower Operational Costs and Simplified Compliance

Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.