Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

post it

Results 201 - 225 of 273Sort Results By: Published Date | Title | Company Name
Published By: Oracle Oracle Marketing Cloud     Published Date: Oct 20, 2015
Lesen Sie diesen kleinen Guide über was Sie tun können, damit Ihre Webseiten und Whitepaper, Social Posts und Suchmaschinenoptimierung vorbereitet sind Ihrem Publikum den Weg zu zeigen, den es sucht.
Tags : 
targeting, clear targeting, customer engagement, gain audience, customer relationship, modern marketers
    
Oracle Oracle Marketing Cloud
Published By: SAS     Published Date: Jul 22, 2019
Text is the largest human-generated data source. It grows every day as we post on social media, interact with chatbots and digital assistants, send emails, conduct business online, generate reports and essentially document our daily thoughts and activities using computers and mobile devices. Increasingly, organizations want to know how all of that data can be used to drive improvements. For many, unstructured text represents a massive untapped data source with great potential for producing valuable insights that could result in significant business transformations or spur incredible social innovation. This paper looks at how organizations in banking, health care and life sciences, manufacturing and government are using SAS text analytics to drive better customer experiences, reduce fraud and improve society.
Tags : 
    
SAS
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Les postes de travail et applications Windows sont des éléments vitaux pour l’entreprise encore aujourd’hui, malgré l’adoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail n’ont pas su évoluer au fil des ans. L’heure de la transformation du poste de travail a sonné.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Nov 12, 2015
avec VMware® Les postes de travail et applications Windows sont des éléments vitaux pour l’entreprise encore aujourd’hui, malgré l’adoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail n’ont pas su évoluer au fil des ans. L’heure de la transformation du poste de travail a sonné.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms
    
VMware AirWatch
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Navigating Uncertainty & Disruption in a Post-Brexit World Risk management and finance professionals are navigating an unprecedented period of uncertainty. In a post-Brexit world, how can business leaders best navigate disruption? Data has become the most valuable business commodity, but not all data is meaningful. Data that helps you uncover hidden associations with customers, partners and suppliers can be a true catalyst for business transformation and growth. In this ebook, we have mapped out the crucial steps in the journey towards operationalizing relationship data to: - Define Relationship Data - Use relationship data to unlock new opportunities - Apply relationship data across the organization to drive growth
Tags : 
    
Dun & Bradstreet
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
When you’re tasked with filling numerous open requisitions, you’ll typically source and engage candidates using the same traditional methods you’ve always used: you’ll post a job requisition online, wait for the flood of resumes to come in, then over-rely on tracking candidates via spreadsheets and emails. This isn't a winning strategy and it actually makes the recruiting process longer, more expensive, and less effective for building a powerhouse workforce.
Tags : 
talent, acquisition, strategy, workforce
    
Cornerstone OnDemand
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Qualys     Published Date: Jan 11, 2017
As a mid-sized or smaller organization, there is a lure of feeling safety in obscurity. “We’re too small to be a target for cyber attacks” is a common refrain used to justify a lax network security posture. Unfortunately, it’s a refrain that may come to haunt you.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Symantec     Published Date: Nov 19, 2014
This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.
Tags : 
the cost of a data breach, business costs of a data breach, responses to a data breach
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
In this sophisticated threat environment,traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization. This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
Tags : 
security, threat enviornment, security posture, cyber resilient enterprise, minimize cyber risk
    
Symantec
Published By: Bridgeline Digital     Published Date: Oct 28, 2013
Blogging. For one contingent of marketers, pumping out posts on the company blog is their favorite part of the day; an opportunity to muse about industry news, highlight their product, and release creative fuel that is otherwise bottled up. For other marketers, blogging is the chore in the way of getting “more important” work accomplished. In other words, writing daily posts is an endless nuisance, like listening to “The Song That Never Ends.”
Tags : 
blogging, corporate blogging, blogging basics, blog speak, blog posts, company blog, blog writing, types of blogs
    
Bridgeline Digital
Published By: Marketo     Published Date: Feb 11, 2019
your brand What content you need to support your social media marketing How often to post on social media (and how to create an editorial calendar) How to measure the effectivene
Tags : 
    
Marketo
Published By: Marketo     Published Date: Dec 12, 2016
Download The Definitive Guide to Social Media Marketing to learn: - How to create a social media marketing strategy - How to choose what social media platforms are right for your brand - What content you need to support your social media marketing - How often to post on social media (and how to create an editorial calendar) - How to measure the effectiveness of your social media campaigns - What team and tools you need to support your social media strategy
Tags : 
marketo, marketing, social media, social media marketing
    
Marketo
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: AdRoll     Published Date: Jan 04, 2019
With over 1 billion active users and counting, it’s no secret that Instagram has rapidly become a major tool for businesses looking to drive tangible sales. From simple advertising options to shoppable post features, it’s now a platform that can help you find and meet your customers—right at their fingertips. But how can you start reaping the benefits for your business? In our new guide The E-commerce Guide to Marketing on Instagram, you’ll find the latest tactics around building awareness, growing your community, and reaching users at every stage of the buyer journey. Designed with marketers in mind, this practical guide also covers: Working with AdRoll to get the most out of the platform The Dos and Don’ts of advertising on Instagram Insightful case studies Actionable tips on everything from branding your profile to creating Instagram ads So, if you’re ready to harness the power of Instagram to take your business to new heights, download our handy guide today.
Tags : 
    
AdRoll
Published By: Skillsoft     Published Date: Aug 26, 2016
What changes are coming as the next generation emerges? Gen Z is the post-Millennial generation and brings a new level of social connectedness, more opportunities for education, and increased economic engagement. What does this mean for businesses, markets and educational institutions? Disruptive invention and reinvention will become the norm. Learn why it’s time to eliminate generational rifts and embrace the changes that Gen Z will bring to business. The Gen Z Effect will help your organization stay current, competitive and relevant to thrive in a world of accelerating change. Download the book summary.
Tags : 
gen z, generation z, millennials, generation, baby boomer, enterprise applications
    
Skillsoft
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an “all-or-nothing” paradigm, instead preferring a pragmatic, “evolution, not revolution” approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud – at least not in the foreseeable future. That’s why so many IT professionals advocate a so-called “hybrid” approach. But what do we mean by “hybrid” and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio
    
Navisite- A Time Warner Cable Company
Published By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : 
network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance, return on investment, roi, riskwatch
    
RiskWatch
Published By: ServiceNow     Published Date: Mar 13, 2019
The move to multicloud and DevOps comes complexity and accelerated development cycles. IT operations is being hindered by the lack of visibility between clouds and on-premise resources. Multicloud capabilities need to enable operations to move to a proactive posture, have end to end visibility, and operation at scale. Get the IDC brief to learn more.
Tags : 
    
ServiceNow
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.