pay

Results 1126 - 1150 of 1190Sort Results By: Published Date | Title | Company Name

Podcasts deliver fresh, authentic audio content to target audiences

Published By: Godfrey     Published Date: Oct 24, 2008
Why are podcasts important? First, podcasts are another innovative way for B2B marketers to communicate directly with their target audiences. Second, podcasts allow marketers to deliver fresh, authentic content, to humanize their companies, to position their companies as thought leaders and to encourage creative thinking. And third, podcasts are becoming the "medium of choice" for customers and prospects who want information fast — in an easily digestible format.
Tags : 
godfrey, organic search, paid search, offline communications, search engine performance, search engine optimization, pay-per-click advertising
    
Godfrey

Waymedia Proximity Marketing: Your Targetted Message At The Precise Time and Place

Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

Meet PCI Compliance using Security Information and Event Management (SIEM)

Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management
    
TriGeo Network Security

LogRhythm for PCI-DSS Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
    
LogRhythm

B-to-B Lead Generation Insights from MarketingSherpa

Published By: Marketo, INC.     Published Date: Sep 25, 2008
In a free audio/video Webcast with MarketingSherpa’s Anne Holland, learn valuable, tested B-to-B marketing tips, including how to stop spending too much on SEM while making your remaining SEM budget work harder... how to make prospects pay attention to your content... the key difference between case studies and success stories... when—and why—you should consider removing the registration page... and more.  Don’t miss these proven tips—watch the free 30-minute Webcast now.
Tags : 
promo code: wp3, marketing sherpa, marketingsherpa, b-to-b, b2b, b-to-b marketing, b2b marketing, marketing budget
    
Marketo, INC.

Benefits of a SaaS E-Commerce Solution

Published By: LaGarde     Published Date: Sep 10, 2008
Software as a service (SaaS) is an application delivery model where a software vendor develops a web-native software application and hosts and operates the application for use by its customers over the Internet. One of the biggest distinctions about this business model is that customers do not pay for owning the software itself but rather for using it.
Tags : 
saas, software as a service, lagarde, ecommerce, ebusiness, online shopping, shopping, software development
    
LaGarde

The Method Behind PCI's Madness

Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection
    
LaGarde

The Business Case for Email Archiving

Published By: GFI     Published Date: Sep 04, 2008
For businesses around the world, email has become the primary means of communication with people inside and outside of the organization. Business transactions kick off in the form of an email, most customers use e-mail to negotiate contracts and agreements and exchange invoices and payment information. Email is also heavily used by marketing departments to issue mailshots to customers announcing new offers and special deals and so on.
Tags : 
email archiving, archive, archiving, email management, email, sarbox, sarbanes oxley, sarbanes-oxley
    
GFI

Support for your PCI Security Compliance Efforts from IBM

Published By: IBM     Published Date: Aug 21, 2008
The world has embraced payment cards to support commercial transactions for almost every kind of business. Unfortunately, the data associated with these payment cards is the focus of many identity theft activities. This white paper outlines Payment Card Industry (PCI) requirements, as well as the benefits of compliance and the penalties for noncompliance.
Tags : 
ibm, ibm mi, ibm grm, pci, pci dss, pci-dss, pci compliance, data theft
    
IBM

How to Boost Your Earnings Per Click - A Special Report for Publishers and Ad Networks

Published By: Click Forensics     Published Date: Jun 25, 2008
The growing problem of decrease traffic quality is making advertisers think twice about where and how they spend their advertising dollars. Learn how to keep them happy and buying in this special report from Click Forensics.
Tags : 
click forensics, traffic quality, lead generation, click quality, quality click, quality lead, cost per click, pay per click
    
Click Forensics

7 Ways to Stop & Prevent Click Fraud - A Special Report

Published By: Click Forensics     Published Date: Jun 25, 2008
What is click fraud?  Who is committing it?  Why should you be concerned about your paid search campaigns?  Learn how to identify if you are at risk with this special report from Click Forensics.
Tags : 
click fraud, ppc, paid search, roi, click forensics, pay per click, pay-per-click, fraud
    
Click Forensics

Why Paid Search Campaigns Often Fall Short of their Volume Targets

Published By: Marin Software     Published Date: Jun 24, 2008
One of the big challenges in search engine marketing is getting all of the volume you want from your campaign.  However, the available volume in paid search is sometimes limited, and prevents you from getting to where you want to in your campaign. In other words, people only search so much on keywords related to your campaign, and there is nothing you can do with your paid search campaign that can change that. Getting at as much (profitable) volume as you can is what it ends up being all about.
Tags : 
lead volume, paid search, ppc, marin, marin software, keywords, pay per click, cost per click
    
Marin Software

Bronco Wine Company: Weaving It All Together With Web Technology

Published By: Inductive Automation     Published Date: Jun 23, 2008
In this case study, Bronco Wine Company, Ceres, Calif., (the producer of “Two-buck Chuck”) uses FactoryPMI for enterprise-wide process monitoring, control and troubleshooting. It was a business decision to use this technology, and is paying off handsomely for the Franzia family-owned business.
Tags : 
bronco, manufacturing, plant management, winery, inductive automation, plm
    
Inductive Automation

Cashless Self Checkout: A Growing Trend That May Be Right For You

Published By: IBM     Published Date: Jun 11, 2008
According to Selfserviceworld.com, 50 percent of consumers prefer to use credit cards at self-checkout counters. As credit card usage continues to rise, it's beneficial for retailers to consider non-cash methods of payment. Download the white paper and see how self-checkout solutions from IBM can help increase sales and improve customer satisfaction.
Tags : 
checkout, retail, point of sale, pos, customer service, ibm, mmdg, customer satisfaction
    
IBM

SEO vs. PPC - The Final Round

Published By: Engine Ready     Published Date: Jun 03, 2008
As an online marketer, what keeps you up at night? For a lot of us, it's the debate over whether to invest our limited promotional budget into SEO or PPC to achieve the highest conversion and average order value. Learn which traffic source provides the highest converting and largest spending customers.
Tags : 
engine ready, engineready, ppc, pay per click, pay-per-click, seo, search engine, search engine optimization
    
Engine Ready

Technology Lead Generation The Way You Want It

Published By: Find White Papers     Published Date: May 07, 2008
Learn how leading vendors in the technology space are reaching IT professionals through dedicated email blasts, contextual email placements, co-branded directories, and contextual placements. Reach millions of IT buyers on a cost per lead basis, paying for only the leads that download your research and that fall within your specified target audience.
Tags : 
fwp, find white papers, directories, white papers, whitepapers, libraries, research, research library
    
Find White Papers

CMD transforms wasted time into billable hours with better file and font management

Published By: Extensis     Published Date: May 04, 2008
Integrated marketing communications agency, CMD, has an easy way of tracking the payoff from implementing Portfolio Server and Suitcase Server to manage their digital assets and fonts. It's called more billable hours.
Tags : 
cmd, extensis, font, website design, server, communications, digital asset management', configuration management
    
Extensis

Get More Out of Existing Data Centers and Pay Less for Cooling Power

Published By: IBM     Published Date: Apr 23, 2008
Data center managers are finding that high-density equipment causes problems such as hotspots and rising cooling costs. In this video, IBM explains how to address green technology issues by getting more out of existing facilities, and then describes an IBM solution that can greatly reduce the energy and power consumption of your data center.
Tags : 
mobile measurement, cooling, cool, data center, heat, power, energy efficiency, ibm
    
IBM

Total Telecoms Expense Management: Looking Beyond Cost Cutting to Gain Greater Value

Published By: Quocirca     Published Date: Apr 15, 2008
Voice and data communications are taking up an increasing amount of organizations’ budgets as more information is shared between and across more businesses. Person to person contact now includes richer media, more participants and is becoming increasingly mobile. Historically, telecoms expense management has focused on the mechanistic processing of bills, payment and costs of individual items.
Tags : 
communication, communications, expense, cost, quocirca, ip telephony, total cost of ownership, voice over ip
    
Quocirca

PCI Compliance: The New Reality for European Retail Companies

Published By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : 
compliance, vpn, retail, managed networks, easynet, network management, pci compliance
    
Easynet

Patient-Centric: the 21st Century Prescription for Healthcare

Published By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : 
health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric
    
IBM

Embracing PCI: Making It Work For You

Published By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
    
Secure Computing

Lock Down Applications for PCI DSS Compliance

Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
    
Secure Computing
Start   Previous    34 35 36 37 38 39 40 41 42 43 44 45 46 47 48    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.