Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 601 - 625 of 1119Sort Results By: Published Date | Title | Company Name
Published By: Interactive Intelligence     Published Date: Feb 26, 2013
Insurers are renewing their focus on top line growth-seeking ways to increase premium volumes while at the same time improving profitability. Properly interacting with customers creates revenue on all ends. Read on to learn about key user interaction
Tags : 
integrated content, communications, key business issues, points of contact, upselling, account management, client services, enterprise applications
    
Interactive Intelligence
Published By: Intermec     Published Date: Jun 20, 2013
Millions of new smart phones continue to ship every month, and many of them find their way into businesses to help workers do their jobs in innovative new ways. However, many of these same phones will be replaced within a year because they are not durable enough to work reliably in new enterprise work environments. In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : 
smart phones, durability, enterprise applications, ruggedness, reliability
    
Intermec
Published By: Intermec     Published Date: Jun 20, 2013
Nearly all the transportation and distribution companies in a market are governed by the similar labor laws, pay the same fuel prices and share the same roads. So why are some much more successful than others? Winning T&L companies don’t rely on cyclical business conditions to be successful. They can be profitable in any business conditions because they are differentiated, either in the services they offer customers or in their underlying business processes.
Tags : 
transportation, logistics technology, business practices
    
Intermec
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: iPass     Published Date: Sep 16, 2009
Thanks to new mobile technologies, work happens everywhere today. It might be responding to email on the morning train or uploading a customer contract during a cross-town cab ride. Your workers need this level of connectivity to compete. At the same time, you likely face unprecedented budgetary challenges.
Tags : 
wireless, wifi, smartphones, pda, security, smartphone, personal devices, nokia, gps, data, ipass, ipass connect, connect, windows mobile, mobility
    
iPass
Published By: Iron Mountain     Published Date: Jun 01, 2015
Dit vijfdelige e-book biedt een uitgebreide en samenwerkingsgerichte strategie om organisaties te helpen hun informatiewaarde te maximaliseren en de risico's in elke fase te beperken. Dit geldt voor de gehele levenscyclus van documenten. Van het aanmaken van records en informatie, via het actieve leven tot de veilige vernietiging ervan.
Tags : 
    
Iron Mountain
Published By: Jamf     Published Date: May 04, 2017
"When contemplating offering Macs to your workforce, the question of cost inevitably comes up. “Macs are great, but I can buy two PCs for the same price as one Mac,” is a common mentality within IT departments. However, when comparing the total cost of ownership associated with providing basic services, software, management and support, the outcome (surprising to some) favors Mac over PC. But how can this b
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 29, 2018
If you’re anything like your peers, you are evaluating your education technology on an annual basis to determine if it’s time for a refresh. While most schools conduct their device refreshes during the summer because teachers, staff and students are not present, this timing can prove costly as the market is flooded with devices from schools doing the same thing. To help school districts re-think their technology spending to focus more on total cost of ownership and residual value, as opposed to upfront cost, we’ve partnered with Diamond Assets — a technology buyback company — to explain: • The true value and cost of iPad and Chromebook in education • When schools receive the most trade-in value for their technology • How to prepare for and execute technology refreshes
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: Jive Software     Published Date: Mar 09, 2012
Social Customer Service offers a new approach that doesn't just tweak the existing trade-offs. It rewrites the entire equation, so companies can boost customer satisfaction, improve rep productivity, and reduce support costs at the same time. Download this whitepaper and learn how Jive can transform your customer service & support teams.
Tags : 
customer satisfaction, customer service, jive, technology, support, technical support
    
Jive Software
Published By: Jive Software     Published Date: Jun 26, 2013
Successful marketing is, at its core, all about collaboration. Yet working together—across teams, departments and agencies, as well as with customers and partners—is getting more difficult as the pace of business and the number of moving parts increase. Most marketers still depend on the same tools and methods they used 20 years ago: email, meetings, phone calls and desktop apps, leading to a lot of disconnects, inefficiency and pain. But change is finally at hand.
Tags : 
marketing, social business technology
    
Jive Software
Published By: Jobvite     Published Date: Aug 25, 2016
This explosion in the amount of information is similar to the boom the marketing world saw in the early 2000’s with the introduction of customer data. Now that recruiters finally have access to the same types of information as marketers, it’s becoming more clear that recruiting is marketing. Whereas the marketing world immediately saw the value in this data and latched onto technologies that could leverage the information, the recruiting world is just catching up. The proliferation of CRMs has revolutionized marketing and business development. Creating and maintaining relationships has always been part of a sound business strategy, but that nebulous process has now been operationalized through software like Salesforce. There is a reason the CRM software market has boomed to over $20 billion...it works. Personalizing the process to maintain constant contact and build relationships has been shown to be extremely effective in converting leads to sales.
Tags : 
    
Jobvite
Published By: Juniper Networks     Published Date: Oct 19, 2015
Wenn Sie erfahren möchten, wie Juniper Networks und VMware gemeinsam daran arbeiten, die Infrastruktur zu vereinfachen, die Provisionierung zu automatisieren und die Orchestrierung zu integrieren, sollten Sie unser White Paper lesen. Erfahren Sie, wie ein software-definiertes Rechenzentrum die Cloud optimieren kann.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Over the years and across industries, it has been proven that increased automation leads to greater efficiency, enhanced productivity and a more agile way of doing business. The same is true for IT: as budgets dwindle, or become stretched to cover a greater range of responsibilities, the need for automation becomes more pronounced.
Tags : 
juniper, network, automation, efficiency, productivity, information technology, networking, wireless, data center
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Wenn Sie erfahren möchten, wie Juniper Networks und VMware gemeinsam daran arbeiten, die Infrastruktur zu vereinfachen, die Provisionierung zu automatisieren und die Orchestrierung zu integrieren, sollten Sie unser White Paper lesen. Erfahren Sie, wie ein software-definiertes Rechenzentrum die Cloud optimieren kann.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Unsere Anleitung mit fünf Schritten zur Firewall-Planung bietet Ihnen eine Zusammenfassung zur Gestaltung der Netzwerk-Firewall. Sie enthält außerdem Links zu noch detaillierteren Websites und Veröffentlichungen zu diesem Thema. Wenn Sie die Firewall-Architektur für Ihr Unternehmen gestalten, sollten Sie zunächst diesen Text lesen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 07, 2017
Für das Internet der Dinge müssen Sie das gesamte Netzwerk sichern (anstatt ein löchriges Netzwerk aufzubauen) Einige Initiativen zur digitalen Transformation konzentrieren sich darauf, die Art zu ändern, wie Mitarbeiter, Kunden, Partner – selbst unbelebte Objekte – mit ihrer technologischen Umgebung interagieren.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
Data center requirements are shifting as the business environment evolves to leverage new technologies. Organizations are turning to multicloud environments comprising a mix of private cloud, public cloud, and on-premise infrastructure to best address their unique needs. Understandably, this shift is putting a renewed emphasis on security, automation, orchestration, and agility. IT leaders are responding by building and deploying multicloud data center networks that leverage automation and software-defined networks (SDN) as a cost effective means of providing dynamic network control. Of course, while many organizations are recognizing the need for a data center upgrade, not all have the same drivers. All, however, need to make a business case for the investment. Here are four common inflection points that can help you to justify the need for data center upgrades that support business goals.
Tags : 
network, performance, data, security, efficiency, iot
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 22, 2017
Businesses increasingly recognize that their customers and workers are engaging in ways that were inconceivable when their essential applications were first architected, according to Chris Rechtsteiner, vice president of marketing for ServerCentral. “A group in one country has to have the exact same service levels as a location in another country, and half the people are internal end users, while the other half are external customers,” he says. As their businesses have globalized, their most strategic applications have struggled to keep pace. “Companies are coming to us, asking ‘How do we do this? How do we solve this problem?’ That’s really what it comes down to.”
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Kaseya     Published Date: May 13, 2015
At the same time that organizations are moving many of their IT assets to the cloud, the problem of how to manage all of an organization’s IT assets has, in many ways, become more complex.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, network architecture, network management, network performance, cloud computing, content management
    
Kaseya
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, servers, small business networks
    
KEMP Technologies
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.