version

Results 401 - 425 of 708Sort Results By: Published Date | Title | Company Name

The 12 PCI DSS 3.0 Requirements Cheat Sheet

Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, sungard, pci, dss, compliance, security, it management
    
Alert Logic and Sungard Availability Services

Mobile Shopping: The Future Of Retail Has Arrived

Published By: Mobify     Published Date: Jan 27, 2015
We at Mobify want to help you further deepen your understanding of the mobile shopping landscape and the expectations of mobile consumers. In this white paper, you’ll discover: - Why ‘omnichannel’ is not a buzzword, but the new retail reality - What the key differences are between smartphone and tablet users and what this means for your bottom line - Why Millennials are a market that you can’t afford to ignore - How your mobile presence can make or break a customer’s in- store experience
Tags : 
mobile website, responsive ecommerce website, mobile conversion optimization, mobile shopping, mobile retail, mobile e-commerce, omnichannel app, make responsive website, ecommerce mobile, e-commerce mobile, mobile retail website, mobile app development, mobile shopping platform, ecommerce mobile website, retail app development, mobile ecommerce solutions, ecommerce app development, ecommerce mobile site, mobile ecommerce site, mobile ecommerce website
    
Mobify

Secure Apps + Instant Access: Connect any user to any app with zero changes to the network

Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp

Supercharge Your Sales Through Content Marketing: 7 Steps to a Content Plan That Drives Real Results

Published By: Digital Bungalow     Published Date: Feb 09, 2015
Just because you have content doesn't mean you're a content marketer. Learn 7 steps that will help you start driving more qualified leads for sales!
Tags : 
content marketing, content plan, content share, sales conversion, customer targeting
    
Digital Bungalow

Why Retailers Need to Reorganize for Effective Content-driven Commerce

Published By: Acquia     Published Date: Feb 26, 2015
Storytelling has long been a staple of good brand marketing. But the concept has taken on more urgency in the digital space, where brands now have the power to engage directly with their customers through web and mobile channels. The mandate for more sophisticated brand content has introduced a new set of challenges for online retailers—namely, how to integrate traditionally separate marketing and commerce operations to deliver a unified experience to shoppers.
Tags : 
organizational restructuring, commerce, e-commerce, increasing conversions, content-driven commerce, brand marketing, mobile channels, online shopping, acquia
    
Acquia

Lush Brings Its Stories to Life Online, Integrating Content and Commerce

Published By: Acquia     Published Date: Feb 26, 2015
With Lush’s in-store sales far outweighing those online, the Managing Director of Lush Digital, Jack Constantine, set out to bring the brick-and-mortar commerce experience to its UK website, powered by dynamic displays, interactive design, and an unforgettable look and feel. Lush wanted to create a digital experience that would weave its stories throughout every page of its website and result in a spike in online sales. Download this case study today to discover what Lush Cosmetics did to transform their online business.
Tags : 
commerce, content and commerce, integration, cosmetics, increasing conversions, site content, content integration, online sales, acquia
    
Acquia

Bridge the Commerce/Content Divide

Published By: Acquia     Published Date: Feb 26, 2015
The Issue: The Content and Commerce Divide Commerce and digital marketing teams tell a familiar story. The commerce team launches an online store on a commerce platform. Commerce and IT focus on the platform and evolve it as the online business grows—focusing on basics such as PCI compliance and product information and expand-ing to more complex integrations. Now they want to add content, such as reviews and engaging media, that will inform and guide shoppers. Meanwhile, the digital marketing team regards the online store as a missed branding and engagement opportunity and tries to jump in and contribute only to find that the system can’t meet their needs. So marketing goes outside to a digital agency, pays for a separate microsite, and takes their creative production needs elsewhere. And thus a classic divide is formed. Download the Forrester Report to learn the impact of integrated and personalized commerce experiences.
Tags : 
commerce, content and commerce, personalization, increasing conversions, digital marketing, commerce platform
    
Acquia

6 steps to mastering dynamic landing pages

Published By: Intercom     Published Date: Apr 05, 2018
In advertising, a one size fits all strategy is too broad to be truly effective. One size ends up fitting none. If you drive all of your paid traffic to your homepage it’s likely you’re missing out on high intent conversion opportunities.
Tags : 
    
Intercom

Five Steps to Worry-Free Endpoint Backup & Data Migration

Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions, security, it management, knowledge management, enterprise applications
    
Code42

Empower Your Employees in a Digital World

Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Help your employees achieve their best with integrated, secure technology Thrive in a fast-changing digital world by giving your people the freedom and flexibility to be productive and work together from anywhere, while maintaining security and compliance. Discover how an integrated solution can deliver: Familiar productivity and collaboration tools System and device management Intelligent security The latest version of Windows for the enterprise
Tags : 
    
Microsoft Office 365

Unblocking Workplace Collaboration

Published By: Microsoft Office 365     Published Date: Mar 01, 2018
A lot can slow down your team. From version control and inefficiencies to separate workflows and inconsistent apps, working together isn’t always easy—but it can be. Solving these problems will enable a productive workforce and business efficiency. Download this free, interactive e-book for complete details.
Tags : 
    
Microsoft Office 365

Unified Endpoint Management: the Next Step in the Evolution of Device Management (German)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Spanish)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (French)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Managing Cash Flow in Times of Crisis

Published By: SAP     Published Date: May 04, 2009
Discover specific actions companies can take to ensure high cash-flow velocity and vital liquidity. Get answers to these key questions: How can I protect the health of my commercial cash flows? How can I gain better visibility into sources and uses of cash? And how can I increase control over my global cash balances?
Tags : 
cash, sap, cash-flow, sap executive, dso, cash conversions, accounts receivable, enterprise software, sales & marketing software, human resources services, payroll software, financial management, expense management
    
SAP

Streamlining Your Conversion to IFRS

Published By: SAP     Published Date: Sep 10, 2009
To meet evolving regulatory mandates, companies around the world are adopting International Financial Reporting Standards (IFRS), a set of methodologies and disclosure requirements for the preparation and presentation of financial statements. Yet making the transition to IFRS is not just a rote accounting exercise.
Tags : 
sap, business objects, business intelligence, ifrs, financial reporting, cash flow, spend management, iasb, sec, erp, epm, business integration, business management, hipaa compliance, it spending
    
SAP

Mastering SAP CRM Sales: Turning Insights into Action

Published By: SAP     Published Date: Mar 28, 2011
Using SAP Knowledge Acceleration software, version for the SAP Customer Relationship Management (SAP CRM) Sales solution, sales professionals gain the comprehensive skills and in-depth knowledge to leverage the sales components of SAP CRM.
Tags : 
sap knowledge acceleration, sap crm, sales solution, customer relationship management, sales automation, sap
    
SAP

Introducing SAP BusinessObjects Planning and Consolidation

Published By: SAP     Published Date: Nov 22, 2011
Become acquainted with the script logic functionality available in SAP BusinessObjects Planning and Consolidation 7.x, version for SAP NetWeaver. Review use cases for script logic, its architecture, various ways to execute it, and a few basic key words. Designed for individuals who will be end users of SAP BusinessObjects Planning and Consolidation or who require a product overview. The goal is to work with the SAP BusinessObjects Planning and Consolidation Excel, Word, PowerPoint and Web interfaces.
Tags : 
sap, businessobject, planning, business, technology, excel, word, powerpoint, project management, finance, best practices, business analytics, business intelligence, business management, analytical applications, financial management, expense management
    
SAP

Top 10 Reasons You Need Centrify for Red Hat

Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration, enterprise applications
    
Centrify Corporation

The Big Impact of Big Data on Affiliate Marketing

Published By: Impact Radius     Published Date: Oct 08, 2014
If you are relying on affiliate networks you have no access to vital data to manage affiliate processes such as tracking, reporting, and contracting. The affiliate networks own the data and control what brands you are able to see. You receive an incomplete view of conversion and performance data, and you are unable to track the true source of every lead across multiple channels. So how could you manage your affiliate programs with the benefits of Big Data intelligence? Read this MarketingProfs whitepaper and get the Big Data intelligence you need to manage a successful affiliate program.
Tags : 
    
Impact Radius

The Many Use Cases of AI for Marketing

Published By: Mintigo     Published Date: Sep 05, 2018
Artificial intelligence (AI) enables marketers using a predictive marketing platform to address many strategic questions. Whether you’re new to AI for Marketing or more seasoned with the use of AI, this ebook is a great resource for you. In this ebook, you’ll learn how to: • Optimize your marketing spending • Increase conversion rate across the funnel • Optimize customer engagement • Cross-sell and upsell throughout your customer base • Segment leads and grow customer value • Grow your market and find new prospects Fill out the form to get your free copy!
Tags : 
    
Mintigo

ADVANCED ENDPOINT PROTECTION: Cylance Security Value Map™ (SVM)

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
BlackBerry Cylance

Predictive Advantage: It’s About Time

Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance

10 Questions to Ask a Live Chat Provider

Published By: Bold Software     Published Date: Mar 15, 2010
If you've downloaded this guide then you already know how a live chat implementation can simultaneously help your business cut support costs and boost online conversions. If you've started investigating solutions then you also know there are a confusing number of choices available. The ten questions listed below can help you to find the right product for your business.
Tags : 
bold software, chat, live chat, e-service, internet retailers, traffic, customer service, benchmarks
    
Bold Software
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.