websites

Results 51 - 75 of 192Sort Results By: Published Date | Title | Company Name

The State of Computer Security and Software-level Solutions

Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.

Monitor Optimize Validate E-Book

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies

The Complete Guide to Performance Testing Your Retail Websites and Apps

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Magic Quadrant for Multichannel Campaign Management

Published By: Adobe     Published Date: Jul 04, 2016
The multichannel campaign management (MCCM) market comprises vendors that seek to orchestrate company communications and marketing offers to customer segments across channels, such as websites, mobile, social, direct mail, call centers and email.
Tags : 
multichannel campaign management, campaign management, mccm, digital marketing
    
Adobe

MANAGING ANONYMOUS AND AUTHENTICATED EXPERIENCES

Published By: Adobe     Published Date: Mar 21, 2017
Digital marketing technologies have transformed both anonymous and authenticated interactions. Online ads, websites, and search reach more anonymous consumers for less, with much better segmentation and measurement. They’ve also added entirely new capabilities like behavioral monitoring and predictive analytics.
Tags : 
    
Adobe

The new power couple: Content and commerce take center stage

Published By: Sitecore     Published Date: Mar 27, 2017
In a digital era where 74% of online consumers get frustrated with websites when content appears that has nothing to do with their interests, it’s time for marketers to think differently about how they personalize the shopping experience, and we’ll show you how. Download now!
Tags : 
    
Sitecore

"Smart way" way to realize "defense-in-depth" and "speed" on the WEB site

Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
Limelight

The New Social Booking Journery

Published By: Reevoo     Published Date: Apr 17, 2012
Shopping has always been social - whether we're buying a camera, booking a holiday or renting a car. People buy from people and discuss their decisions. Today, social commercie is back in a big way. The travel industry has fully embraced the power of the crowd and it's hard to find a serious travel site that doesn't have some form of traveller reviews. In thisebook, you will learn about weaving social engagement into every step of the new booking journey to make it easy for people to book with you and share their great experience with others.
Tags : 
reevoo, travel, booking, social media, e-commerce, digital, online, websites
    
Reevoo

Managed Public Key Infrastructure (PKI) for Strong Authentication and Remote Access

Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access, access control, application security
    
Entrust Datacard

Protecting Your APIs Against Attack and Hijack

Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies

Transforming Digital Business with APIs

Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies

Getting started with experimentation

Published By: Optimizely     Published Date: Apr 06, 2018
We live in the age of the consumer. Across touchpoints, customer expectations for digital interactions and brand experiences are evolving. Today, it is critical for organizations to deliver high-performing, personalized encounters across the customer journey. To drive innovation and stay competitive, organizations need to reorient towards the customer—which means being able to understand their needs, adapt to their expectations, and quickly make improvements. But pinpointing where to make iterations across your tactics and digital entities like websites and landing pages can be a difficult task—especially in today’s multi-touch environment.
Tags : 
    
Optimizely

The Surprising Power of Online Experiments

Published By: Optimizely     Published Date: Apr 06, 2018
The Need When building websites and applications, too many companies make decisions- on everything from new product features, to look and feel, to marketing campaigns- using subjective opinions rather than hard data. The Solution Companies should conduct online controlled experiments to evaluate their ideas. Potential improvements should be rigorously tested, because large investments can fail to deliver, and some tiny changes can be surprisingly detrimental while have big payoffs.
Tags : 
    
Optimizely

5 Schritte zur Planung Einer Firewall

Published By: Juniper Networks     Published Date: Jan 11, 2016
Unsere Anleitung mit fünf Schritten zur Firewall-Planung bietet Ihnen eine Zusammenfassung zur Gestaltung der Netzwerk-Firewall. Sie enthält außerdem Links zu noch detaillierteren Websites und Veröffentlichungen zu diesem Thema. Wenn Sie die Firewall-Architektur für Ihr Unternehmen gestalten, sollten Sie zunächst diesen Text lesen.
Tags : 
    
Juniper Networks

Making DDoS Mitigation Part of Your Incident Response Plan: Critical Steps and Best Practices

Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security, anti spam, anti virus, ddos
    
Akamai Technologies

Web Customization in 5

Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress

Advanced Strategies to Flexibly Manage the Long-Term Business and IT Impact of Bots

Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia

Towards A Digital Future

Published By: Civica Digital     Published Date: Sep 28, 2018
If there’s one thing that stands out about central government, it’s the appetite for digital transformation. Whether delivering new customer-facing websites to drive better engagement with services or establishing a centre of excellence to accelerate the take-up of robotic process automation (RPA), UK government is embracing opportunities to modernise with new technologies. But despite the great strides made in the last few years, the UK is slipping backwards in E-Government development terms – down from #1 in 2016 to #4 in 2018, according to the UN E-Government Survey 2018. Some argue this is due to the government having tackled the more straightforward digitisation opportunities and because it is now facing the bigger, more complex systems that need modernising. Our research shows that there are also wider challenges, including uncertainty around the impact of Brexit, budgetary pressures and emerging technologies, coming into play. So what needs to happen to overcome our challenges
Tags : 
    
Civica Digital

Usability Tips

Published By: Sage People     Published Date: Jan 26, 2018
Your essential guide to making a great user experience. Create more love for your business with our 12 top tips. A good experience means more sales. A bad experience will not only stop you converting customers, but will effect your reputation as a brand. Many websites offer the same or similar products and services—if your shopper can’t find what they’re looking for easily, they’ll simply move on to the next site. Alongside our partner and e-commerce expert INVIQA, we’ve compiled our 12 top tips to help refresh your website’s usability. These little changes are easy to implement and could make a big impact to your conversion rates.
Tags : 
    
Sage People

How Brand Marketers Deliver Personalized Consumer Experiences...In A Split Second

Published By: Neustar     Published Date: Aug 20, 2012
Viewers will learn how to utilize customer data combined with next generation marketing analytics to create granular consumer segmentation that can be put to action in real-time on their Websites.
Tags : 
web analytics, site optimization, segmentation, customize messaging, custom offers, marketing strategy, personalized website, custom landing page
    
Neustar

Ten Best Practices for URL Filtering: Protect users from accessing malicious websites

Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee

The Rise of User-Generated Content - How brands are transforming their websites into social hubs

Published By: EngageSciences     Published Date: Nov 04, 2014
Discover the latest research on the fundamental impact UGC is having on brands, and how it can drive audience acquisition, boost engagement and optimise commerce.
Tags : 
user generated content, ugc, advocacy marketing, content aggregation, content curation, social commerce, social media marketing, the power of user generated content
    
EngageSciences

140 Ways to Use Social Media to Engage and Communicate to Employees

Published By: Davis & Company     Published Date: May 11, 2015
The guide contains links to social media statistics, informative websites, and other resources.
Tags : 
social media, employee engagement, buy-in, employee participation
    
Davis & Company

SecureWorks Threat Intelligence Executive Report

Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.