businesses

Results 2451 - 2475 of 2545Sort Results By: Published Date | Title | Company Name

Guide: How to End IVR Horrors

Published By: Vonage Business     Published Date: May 01, 2019
Who among us has not recoiled before the horror of a terrible Interactive Voice Response (IVR) experience? IVR technology was created to save businesses money, but it has mutated into a timesucking, customer experience-crushing monster! If connecting with a customer in this day of customer experience is the goal, there’s a better way! Contain the IVR before it kills another customer relationship. Can we bring the technology to heel and bend it to our will? And can we stop its rampage before artificial intelligence makes it too powerful to be stopped?
Tags : 
    
Vonage Business

Wasabi Ushers in Cloud Storage 2.0, the next generation of storage needs.

Published By: Wasabi     Published Date: Oct 23, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
wasabi, cloud storage, data storage, storage solutions
    
Wasabi

Wasabi Ushers in Cloud Storage 2.0, a New Era of Possibilities Purpose Built for the Next Generation

Published By: Wasabi     Published Date: Oct 24, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
    
Wasabi

Policy -The Foundation to Business Security

Published By: WatchGuard     Published Date: Oct 16, 2012
The importance of effective security for businesses can't be understated and effective IT policies must be made. With this overwhelming amount of data in your hands, how do you ensure proper network defense and actionable incident responses?
Tags : 
watchguard, it policy, data management, aup, risk, data security, security, business technology
    
WatchGuard

Securing the Virtual World

Published By: WatchGuard     Published Date: Oct 16, 2012
Businesses of all sizes have leveraged virtualization to improve utilization and reduce costs. Virtualization - Are You Secure? This white paper explores the advantages of virtualization and the potential security challenges that come with it.
Tags : 
watchguard, infrastructure, virtualization, cloud computing, security, it security, data security, business technology
    
WatchGuard

Overcoming the Two Big Obstacles to Deploying Email Encryption: Cost and Complexity

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption, email security
    
WatchGuard Technologies

A Changing Threat Landscape for the Retail Industry

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks
    
WatchGuard Technologies

Waterline Data: Solution Overview

Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Today, businesses pour Big Data into data lakes to help them answer the big questions: Which product to take to market? How to reduce fraud? How to retain more customers? People need to get these answers faster than ever before to reduce “time to answer” from months to minutes. The data is coming in fast and the answers must come just as fast. The answer is self-service data preparation and analytics tools, but with that comes an expectation that the right data is going to be there. Only by using a data catalog can you find the right data quickly to get the expected insight and business value. Download this white paper to learn more!
Tags : 
    
Waterline Data & Research Partners

Gartner: Maximize the Business Value of your Data Lake with a Smart Data Catalog

Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners

10 Ways for SMBs to Capture Value from their Data

Published By: we are cloud     Published Date: Sep 02, 2010
When it comes to acquiring business intelligence (BI) capabilities, many small and medium-sized businesses (SMBs) have traditionally been at a disadvantage. Here are 10 ways for them to capture value from their data.
Tags : 
smbs, data management, dashboarding, business intellignce
    
we are cloud

The Fast Track to Service Management Success: Software-as-a-Service

Published By: WebEx     Published Date: Dec 14, 2007
With the growing array of hardware, software, and systems necessary to support businesses, today more than ever, software-as-a-service or on-demand solutions offer feature-rich, real-time functionality without the burden associated with deploying, managing and supporting an in-house approach.  See if it’s right for you.
Tags : 
service management, saas, software as a service, customer service, smb, small business, soho, midsize
    
WebEx

Real Results Report: Companies Maximize eLearning Experiences with WebEx Training Center

Published By: WebEx Communications     Published Date: Dec 14, 2007
Businesses around the world are learning new ways to optimize their training efficiency using on-demand web services. These companies use WebEx Training Center to reach and train a constantly growing number of employees and customers around the globe. Using WebEx, businesses can now educate anywhere, any time, without boundaries.
Tags : 
e-training, etraining, e-learning, elearning, employee education, education, training, collaboration
    
WebEx Communications

Real Results Report: The True Opportunity of Online Learning

Published By: WebEx Communications     Published Date: Dec 14, 2007
Those businesses that have actively fostered deployment of e-learning into all points of the enterprise are now in the enviable position of experiencing geometrically increasing levels of operational and strategic efficiency. And those corporate learning officers and training managers that went through the arduous process of developing a business case in support of e-learning are now key strategic players in their organizations.
Tags : 
e-training, etraining, e-learning, elearning, employee education, education, training, collaboration
    
WebEx Communications

Real Results Report: WebEx Increases Productivity for the Enterprise

Published By: WebEx Communications     Published Date: Dec 14, 2007
Enterprises around the world are discovering new ways to optimize business processes using on-demand web services. These businesses use WebEx online collaboration applications to reach, educate, and support a growing number of employees and customers. Companies can now collaborate anywhere, any time, without boundaries.
Tags : 
online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos
    
WebEx Communications

Free White Paper On Efficiency and Cost Control In Network and Application Management.

Published By: Webfishery     Published Date: Aug 03, 2010
This white paper explains how businesses can develop effective strategies to improve efficiency and reduce networking and application costs.
Tags : 
application management, white paper, bandwidth management, ethernet networking, gigabit networking, infrastructure, internetworking hardware, local area networking
    
Webfishery

Making the Transformation to SOA

Published By: webMethods     Published Date: Aug 21, 2009
This white paper explores why service-oriented architecture has emerged as one of the most significant developments in IT, and is followed by an overview of how businesses can make the transformation to service-orientation.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, web methods, webmethods, software development, it management
    
webMethods

How to Protect Your Business from the Coming Malware Storm

Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
    
Webroot

Infographic: Web Threats — Is Your Company Exposed

Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security, business technology
    
Webroot

Survey: Web Threats Expose Businesses to Data Loss

Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach, business technology
    
Webroot

Whitepaper: Phishing 2.0: Why phishing is the No. 1 web threat, and how web security can protect you

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security, business technology
    
Webroot

Whitepaper: Managing Web Security in an Increasingly Challenging Threat Landscape

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security, business technology
    
Webroot

Building a Business Case: Integrated Mobile Security For Small and Midsize Businesses

Published By: Webroot UK     Published Date: Aug 07, 2013
Mobility is one of the driving factors for all business and IT initiatives. IDC has characterized it as one of the four pillars of computing’s next dominant platform, along with social media, Big Data and cloud services. Mobility has the potential to dramatically enhance business agility, improve employee productivity and enable major shifts in the way individuals and businesses approach work.
Tags : 
mobile, security, small business, midsize business, improve employee productivity, business agility
    
Webroot UK

Marketing and Mobile: Prove Your Success

Published By: Webtrends     Published Date: May 18, 2010
Mobile marketing investments will likely triple over the next five years. In the haste to stake a claim in the mobile gold rush, many businesses skip the lessons learned from the last big push: to be successful, you'll need to measure and quantify your results with mobile analytics.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends

Examining the Hidden Costs of Fatigue

Published By: WFS Australia     Published Date: Dec 02, 2015
Fatigue management delivers business benefits in terms of your overall workforce management strategy, whether it is an expected function of the business or not. Mitigating fatigue risk can have a dramatic impact on your workforce and your bottom line. Proactively managing employee fatigue is a hallmark of leading businesses, as it demonstrates concern for your employees, customers and the larger community.
Tags : 
employee fatigue, productivity, workforce management, productivity, fatigue management
    
WFS Australia

Business Communications Systems - Market Primer

Published By: Wheelhouse     Published Date: Aug 09, 2013
Many small businesses are extremely good at what they do. This, of course, is the reason they can hold their own in a highly competitive marketplace. Competitors can emerge from the most unexpected places and therefore there is simply no room for complacency. You can be the best at making the widget or offering the service, but be sure that someone, somewhere, is studying you and looking for a way to offer a better product at a lower price.
Tags : 
business communications, communication systems, market primer
    
Wheelhouse
Start   Previous    88 89 90 91 92 93 94 95 96 97 98 99 100 101 102    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.