Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

alm

Results 326 - 350 of 495Sort Results By: Published Date | Title | Company Name
Published By: Engagio     Published Date: Jan 14, 2019
B2B demand generation has almost completely re-invented itself over the last decade. The collision of inbound, content marketing, lead nurturing, marketing automation, analytics, email, search, social media and native advertising has transformed the discipline from a dark art to an increasingly data-driven science. But there’s a problem When it comes to helping to land and expand these major deals, today’s marketing teams are seriously handicapped. The Clear & Complete Guide to Account Based Marketing (ABM) is your guide to solving this problem. It will take you, step-by-step, through this fast-emerging discipline, showing you how to align your sales and marketing team around a strategy that’s optimized for the biggest, most important deals.
Tags : 
    
Engagio
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification, network security
    
Qualys
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: G/O Digital     Published Date: Nov 13, 2014
A lot has changed in the 10 years since Facebook first launched. No longer are social networking sites just a place where people can stay in touch with friends. Now, 30 percent of people use Facebook as their primary source of news. While Facebook is still the number one social network, Twitter, Google Plus, LinkedIn, Instagram, and Pinterest are all growing at steady rates and millions of users are accessing these sites from the palm of their hand with smartphones and other mobile devices. Download this whitepaper to learn how you can leverage social networking to quickly reach users and entire online communities to boost your business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design, enterprise applications
    
G/O Digital
Published By: ScanLife     Published Date: Feb 25, 2012
Good use of QR codes can catapult a campaign into the realm of the innovative, however, true innovation requires the effective use of new technology. And since the technology is new, literature and knowledge regarding its effective usage is scarce, resulting in the failure of many QR Code campaigns. Read to find out more.
Tags : 
scanbuy, marketing, emerging marketing, qr codes, mobile marketing, mobile apps, mobile uploads
    
ScanLife
Published By: IBM     Published Date: Jul 23, 2009
Co-authors Moshe Cohen and Michael Lundblad examine the balance in managing business transformation and risk, look at reasons for software development's changing landscape and discuss solutions that can help your organization improve quality management to position you for innovation and growth.
Tags : 
ibm, ibm telelogic, roi, infrastructure, soa, alm, kpi, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 23, 2009
Download this white paper and find out  how technological advances are enabling collaboration to extend across the enterprise and through outsourced resources with globally distributed development. (GDD)  Learn how GDD is enabling companies to expand their operations on a  worldwide basis, cost and skills arbitrage, and reduced time to market.
Tags : 
ibm, ibm telelogic, global collaboration, global distributed development (gdd), wide area network (wan), application lifecycle management (alm), lan, software configuration management, enterprise applications, wide area networks
    
IBM
Published By: Qualys     Published Date: Sep 29, 2016
With ThreatPROTECT, you get a holistic, contextual and continually updated “at a glance” view of your threat exposure. The latest addition to the Qualys Cloud Platform, ThreatPROTECT eliminates guesswork and flags for you which vulnerabilities you must tackle now
Tags : 
protection, threats, data, vulnerabilities
    
Qualys
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
    
Aerohive
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
Is building custom software a necessary evil, a process that’s divorced from the really important parts of a business? Or is the ability to do this well the underpinning of every successful organization? The truth is probably somewhere in between these two extremes. One thing is clear, however: In many organizations, how well a firm executes its business strategies is inextricably tied to how good it is at creating and running new applications.
Tags : 
vsts, alm, application lifecycle management, business strategy, it alignment, software development, it management
    
Microsoft Visual Studio Team System
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
Being better than your competitors at creating and using custom software can bring substantial competitive advantage. Similarly, being worse can put you at a significant disadvantage. If your organization doesn’t see ALM as one of its most important business processes, it’s time to change that view.
Tags : 
vsts, alm, application lifecycle management, moody’s, alm, business process, software development lifecycle, sdlc, software development, enterprise applications
    
Microsoft Visual Studio Team System
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
This is an important moment in the evolution of development tools. Since team development tools are now focusing on the right problem, they have more to offer than they did ten years ago. Organizations doing team-based development—a category that includes almost everybody—can benefit from taking another look at this style of tool. Learn more today!
Tags : 
vsts, team development, software development, optimizing end-to-end development, combining tools, enterprise applications
    
Microsoft Visual Studio Team System
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform, designer-developer collaboration, application life-cycle management, alm, microsoft visual studio team system, version control, work assignment, tracking, builds, testing, shaw group, microsoft .net framework, ch2m hill
    
Microsoft Visual Studio Team System
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: NetApp     Published Date: Mar 12, 2010
Find out how NetApp and VMware enable customers to improve disaster preparedness while saving money. Today, at Tucson Electric Power, almost 90 percent of servers are virtual, 100 percent of daily backups can now be performed within a 24-hour window, disaster preparedness is greatly improved, regulatory requirements are met, and the IT infrastructure is ready for the future. Download this report to learn more.
Tags : 
netapp, data management, disaster recovery, back up, storage, server virtualization
    
NetApp
Published By: Arkadin     Published Date: Sep 11, 2013
The legal industry, like almost all others, is faced with doing more with fewer resources. This whitepaper provides valuable information on how remote collaboration solutions such as audio, video, and web conferencing can help lower costs, increase productivity, and drive incremental revenue.
Tags : 
legal, legal solutions, legal communications, legal collaboration, legal conferencing, legal issues, compliance laws, law, legal services, remote collaboration, remote conferencing, remote communications, arkadin, remote depositions, litigation, cost effectiveness, legal market place, web and audio conferencing, web conference, audio conference
    
Arkadin
Published By: Silver Peak     Published Date: Jun 24, 2013
Enterprises are relying on WANs to carry more data than ever. With cloud computing, offsite disaster recovery and big data on the rise, it's more important than ever for IT professionals to boost application performance across the WAN. However, times are changing. Instead of deploying a physical WAN optimization appliance to improve application performance, the industry is moving to a better approach - virtual WAN acceleration software. It can be downloaded in minutes, runs almost anywhere, and controlled with the click of a mouse for maximum flexibility. In this report we not only explore the requirements for virtual WAN optimization but compare how Silver Peak's virtual WAN acceleration stacks up against Riverbed's physical Steelhead appliance.
Tags : 
enterprises, cloud computing, offsite disaster recovery, big data, technology, virtual wan, software, optimization, application, security
    
Silver Peak
Published By: Oracle     Published Date: Nov 27, 2013
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do? Fortunately, in today's customer service world, there are options. Download this White Paper for more information.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management
    
Oracle
Published By: Oracle     Published Date: Nov 27, 2013
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do? Fortunately, in today's customer service world, there are options. Download this White Paper for more information.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do?
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, knowledge management
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do?
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, knowledge management
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do?
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, knowledge management
    
Oracle
Published By: Adobe     Published Date: Mar 16, 2016
While most business is digital, and business-to-business and business-to-consumer transactions – and the work that supports them -- are almost entirely digitized, most organizations still rely on paper for the “last foot” of the process – the sign-off. Continued reliance on paper-based signature is fraught with risks, including impeding productivity, reducing visibility, hampering compliance, and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility. Read this Forbes Insights piece to learn: • How an easy implementation of e-signatures can improve productivity and reduce busywork for your sales team • How improve customer experiences and ease of business with e-signatures increases the likelihood of renewal and retention • How e-signatures easily integrate into your existing sales tools, for seamless pr
Tags : 
sales performance, e-signatures, b2b, b2c, networking
    
Adobe
Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention, it management
    
IBM MaaS360
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security, it management, enterprise applications
    
Code42
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.