filter

Results 1 - 25 of 147Sort Results By: Published Date | Title | Company Name

Best Practices in Email Deliverability

Published By: Act-On     Published Date: May 10, 2012
For an email campaign to be successful, marketers must reach the right person at the right time, with the right offer. By learning the basics of deliverability, you're better prepared to build emails that will actually reach your potential customers.
Tags : 
email deliverability, deliverability, best practices, spamtrap, spam filtering, blacklists, blocklists, soft bounce
    
Act-On

eMarketer's top digital trends for 2012 and beyond

Published By: Adobe     Published Date: Jun 29, 2012
Where should you be advertising in 2012? How will consumer behavior change the way you interact with your audience? What mobile trends will impact you most this year? Marketers, retailer, content owners and technology firms are more focused than ever on obtaining results from investments in digital marketing. If past years were about amassing data from the touch points between companies, 2012 will be about curating, filtering and measuring that information to drive outcomes.
Tags : 
adobe, marketing, emarketer, digital trends, digital marketing, advertising
    
Adobe

AWS Security and Networking - Filtering Cloud Network Traffic and Preventing Threats

Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services

Reducing the complexity of sub-band ADPCM coding to enable high-quality audio streaming from mobile

Published By: APTX     Published Date: Nov 05, 2009
This paper discusses research undertaken to lower the complexity of existing high-quality sub-band ADPCM coding schemes to better satisfy these conflicting criteria.
Tags : 
aptx, sub-band adpcm coding, mobile, compression, wireless audio streaming, filter bank, stereo intensity, wireless communications
    
APTX

Astaro Outperforms Cisco as an Integrated Security Solution at Devine Millimet

Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet
    
Astaro

Astaro Receives an "A" at Fowlerville Community School for Blocking Inappropriate Materials

Published By: Astaro     Published Date: Aug 10, 2009
The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.
Tags : 
inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter
    
Astaro

Astaro Security Gateway Removes Spam to Keep Kauffman Tires Network Rolling

Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn
    
Astaro

Why the City of Lake Wales (Florida) Selected Astaro Security Gateway over Cisco-Pix

Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls
    
Astaro

Hannoush Jewelers selects Astaro Security Gateway over SonicWall

Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam
    
Astaro

Associates in Rehabilitation Medicine Heals their Network Ills with Astaro

Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro

Saint Joseph Abbey and Seminary College Puts Faith in Astaro

Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management
    
Astaro

Automating the Future of Work - The Rise of Digital Workers

Published By: Automation Anywhere APAC     Published Date: May 30, 2019
In this InfoBrief, we discuss the broad impact of digitization and how organizations are utilizing RPA technologies for driving business outcomes. We also share use cases and examples from different sectors, as well as key factors that organizations need to consider when selecting a partner for RPA deployment. Since RPA is the latest buzzword, there is a lot of noise around this topic and we aim to filter the noise and provide key insights, as well as offer essential guidance for successful RPA strategies.
Tags : 
    
Automation Anywhere APAC

Automating the Future of Work - The Rise of Digital Workers

Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
In this InfoBrief, we discuss the broad impact of digitization and how organizations are utilizing RPA technologies for driving business outcomes. We also share use cases and examples from different sectors, as well as key factors that organizations need to consider when selecting a partner for RPA deployment. Since RPA is the latest buzzword, there is a lot of noise around this topic and we aim to filter the noise and provide key insights, as well as offer essential guidance for successful RPA strategies.
Tags : 
analyst, artificial intelligence, intelligent automation, rpa, digital workforce
    
Automation Anywhere APAC

Securing Your AWS Global Transit Network: Are You Asking the Right Questions?

Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix

Email Insider Threat Prevention

Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
    
BAE Systems

Solution Brief: Customer Benefits of the New Blue Coat WebFilter Categories

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits, web content, manage, content management
    
Blue Coat Systems

Blue Coat WebFilter: Delivering the web access your users want with the control you need

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems

Solution Brief: Customer Benefits of the New Blue Coat WebFilter Categories

Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits, web content, manage, content management
    
Blue Coat Systems UK

Game of Thrones, SKY & DDB: A social media campaign that reigned supreme

Published By: Brandwatch     Published Date: Apr 22, 2015
Download this case study to learn how agency DDB was able to use Brandwatch’s powerful coverage and flexible filtering capabilities to measure the success of its new Game of Thrones campaign.
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns
    
Brandwatch

Email Design Best Practices

Published By: Bronto     Published Date: Jan 03, 2013
In light of the increasing use of preview panes, filters and the default blocking of images in popular email clients such as Outlook, Gmail and AOL, Bronto has outlined design best practices that will help you successfully reach your audience.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto

Anti-Malware Battlefield Tools: Customer Perspectives and Reference RFI

Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering, intrusion detection
    
Burton Group

Increasing Email Deliverability: Getting Email to the Inbox

Published By: Campaigner     Published Date: Jan 08, 2007
This white paper is designed to educate you about the main obstacles that can prevent your email from reaching a recipient’s inbox; and the simple tactics that you can implement to avoid these obstacles.
Tags : 
email deliverability, email marketing, email, email filtering, customer reach, customer relationship management, got corp, got corporation
    
Campaigner

97% of Campaigner Email Marketing Campaigns Avoid Spam Filters and Reach the Inbox

Published By: CampaignerCRM     Published Date: May 04, 2012
Campaigner is the pioneer in email marketing services, mailing since 1999. Create, launch and track email campaigns. Exceptional deliverability and 24/7 in-house support. Sign up today and get a FREE 30-Day Trial!
Tags : 
campaigner, marketing, email, internet, email marketing, campaign tracker
    
CampaignerCRM

Data and Identity Security

Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents
    
CDW Symantec

Personalization Technology Brief: Traditional Approaches Contrasted with ChoiceStream’s Universal

Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream's approach towards personalization differs dramatically from others.  In "Traditional Approaches Contrasted with ChoiceStream's Universal Recommender" technology brief you'll learn about the components of personalization systems.  Most importantly, you’ll learn how to choose a winning algorithm that provides the right personalization solution for your online store.
Tags : 
choicestream, personalization technology brief, universal recommender, best-of-breed personalization, collaborative filtering, preference capture, algorithms
    
ChoiceStream
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.