Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

all ict

Results 301 - 325 of 365Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize, security
    
Cisco
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security, it management
    
EMC Corporation
Published By: Adobe     Published Date: Aug 05, 2014
Marketers have more channels to choose from than ever before. In 2014, their choices will become even more numerous, thanks to increasing device proliferation, the Internet of Things and the digitisation of offline channels. Crucial to succeeding in this increasingly complex world is the one concept underlying all marketing channels and the very best programs: data in, data out. In this report, we predict how data-driven marketing will evolve in 2014.
Tags : 
marketers, marketing channels, data, internet, data-driven
    
Adobe
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms, security
    
Entrust Datacard
Published By: TeamQuest     Published Date: Jul 11, 2014
In this whitepaper you will learn about the following: • Analytics and today’s optimization challenges • What REALLY matters • Desired state and results • Methodology and ideation examples – Business and service aligned – Automated and predictive IT analytics • Recommendations Download to learn more!
Tags : 
mobile app, optimizing it, automated and predictive it analytics, it management, enterprise applications
    
TeamQuest
Published By: Gleanster Research     Published Date: Jul 02, 2014
In this Deep Dive we will explore what sales leaders should actually be demanding from marketing automation tools. In fact, survey data paints a very compelling picture about how sales should be evaluating the impact of marketing automation on sales performance. We'll explore why sales might be resistant in the first place, and how Top Performing organizations overcome these challenges to help support the collaborative pursuit of top line revenue growth between marketing and sales.
Tags : 
gleanster, sales, marketing, marketing automation, revenue, marketing automation tools, sales performance, sales analytics
    
Gleanster Research
Published By: Lattice Engines     Published Date: Jun 19, 2014
Everyone is talking about predictive analytics these days, but what does it mean for B2B marketers? Find out how top demand generation professionals are using predictive applications powered by leading edge data science to optimize all stages of the funnel. Read Lattice Engine’s latest ebook, Decoding Predictive Marketing, and learn where predictive fits into your marketing mix.
Tags : 
lead scoring, marketing automation, predictive analytics, predictive marketing, predictive lead scoring, b2b marketing, lead nurturing, lead management, lead prioritization, lattice engines, demand generation, lead qualification, qualifying leads, score leads, lead score
    
Lattice Engines
Published By: BMC Software     Published Date: May 28, 2014
Learn how BMC Control-M for for Hadoop allows IT to extract value from big data, with clear visibility, predictability and increased productivity and efficiency.
Tags : 
it management, enterprise applications
    
BMC Software
Published By: HP and Intel ®     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP
Published By: HP     Published Date: May 14, 2014
What worked in storage yesterday is not necessarily effective for today or tomorrow. Legacy storage is too complex and not well aligned with today’s business strategies and objectives. Many storage platforms are not up to the challenge of today’s unpredictable workloads and unconstrained data growth. They don’t offer the adaptability, agility and consolidated management capabilities IT requires, which means that IT needs a future-proof storage architecture. Learn about the next generation in storage.
Tags : 
converged storage, legacy storage, future proof storage, storage, hp converged storage
    
HP
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data center
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data center
    
Intralinks
Published By: IBM     Published Date: Mar 07, 2014
2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.
Tags : 
consolidated communications, ibm, predictive insights, infrastructure, problem solving, network
    
IBM
Published By: Avalara     Published Date: Jan 28, 2014
States, counties and municipalities have historically relied on local brick-and-mortar businesses to collect retail sales taxes. These businesses collected the sales tax from their customers, and then remitted the tax proceeds to their local sales tax jurisdiction. It was a straightforward process, and no one much quarreled with who owed the taxes and who would receive them. That straightforward proposition became complex with the rise of thousands of catalog merchants in the ‘70s and ‘80s. Catalog merchants sold to consumers nationwide, who began to shift their purchases away from local brick-and-mortar merchants. This reduced revenue to local sales tax jurisdictions because catalog companies rarely collected sales taxes from their customers. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, e-commerce, enterprise applications
    
Avalara
Published By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : 
vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup, pc life-cycle management tools, networking, it management, enterprise applications, data center
    
VMware, Inc
Published By: IBM     Published Date: Oct 24, 2013
Today, the retail industry faces daunting challenges as a result of current uncertain economic conditions, conflicting market influences and changes to financial reporting standards. Traditional point solutions utilized in the various phases of the real estate life cycle are no longer adequate to meet these challenges. This whitepaper examines the benefits of implementing life cycle management solutions in the retail environment.
Tags : 
lifecycle management, real estate systems integration, real estate, retail, retailer, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace, telecom
    
IBM
Published By: Urban Airship     Published Date: Oct 08, 2013
While free apps proliferate, many fall victim to the download-try-delete cycle, making the average lifespan of an app just 30 days. How can brands keep their place on a customer's mobile device? This whitepaper discusses how an app can deliver value to maintain its place on a customer's phone, and how added value can prompt customers to share some private information and opt in to push notifications. Dig deeper into the key performance indicators (KPIs) for apps that achieve this privacy-value exchange.
Tags : 
mobile value exchange, mobile marketing, mobile relationship management
    
Urban Airship
Published By: IBM     Published Date: Aug 20, 2013
Decisions, decisions. They can make or break marketing success. Yet as customers and channels grow more complex, so does decision-making. As choices multiply, marketing becomes more challenging than ever. The days when marketers could rely strictly on good judgment and business acumen are past. Technology for decision and process automation gives marketers a decided edge in making spot-on decisions that match individual customers to the best message, on a scale of millions.
Tags : 
enterprise marketing management, customer marketing, customer communication, marketing channels, interactive marketing, emm, process automation
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
Decisions, decisions. They can make or break marketing success. Yet as customers and channels grow more complex, so does decision-making. As choices multiply, marketing becomes more challenging than ever. The days when marketers could rely strictly on good judgment and business acumen are past. Technology for decision and process automation gives marketers a decided edge in making spot-on decisions that match individual customers to the best message, on a scale of millions. The process of Decide builds on customer data collection and analysis, and positions your organization for profitable engagement with your Generation C connected customers. It plays an essential role in Enterprise Marketing Management (EMM) along with the processes of Collect, Analyze, Deliver and Manage.
Tags : 
enterprise marketing management, customer marketing, customer communication, interactive marketing, emm, process automation, marketing strategy, multi-channel marketing, customer relationship management
    
IBM
Published By: Riverbed     Published Date: Jul 17, 2013
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. The ability to proactively monitor traffic within these environments is critical for enabling predictable and reliable delivery of applications and for troubleshooting diverse IT infrastructures. Read this white paper to learn more.
Tags : 
traffic, virtualization, it infrastructures, bandwidth management, infrastructure, local area networking, monitoring, network architecture, network management, network performance, network performance management
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.