Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

strengthen

Results 51 - 75 of 184Sort Results By: Published Date | Title | Company Name
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication
    
Centrify
Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control
    
Mimecast
Published By: Oracle OMC     Published Date: Nov 30, 2017
Oracle Marketing Cloud is an all-in-one solution that helps retail marketers develop direct relationships with customers through seamlessly orchestrated cross-channel digital experiences—online and offline—that facilitate and strengthen customer interactions across a constantly growing list of digital touchpoints. The result is consistent, relevant, and contextual cross channel experiences efficiently orchestrated to customers wherever they are.
Tags : 
    
Oracle OMC
Published By: Verizon     Published Date: Nov 14, 2013
Learn 7 advanced cyber-security threat management solutions in order to prevent data breaches and strengthen your organization’s ability to detect and respond to these threats in days instead of months.
Tags : 
verizon, cyber-security, threat management solutions, external reconnaissance, data exfiltration, it management
    
Verizon
Published By: Cisco     Published Date: Jan 14, 2014
This study focuses on Cisco's enterprise data center strategy and portfolio including UCS and Nexus technologies.
Tags : 
cisco, datacenter management capabilities, usc, unified computing system, cloud, virtualization, nexus technologies, it management
    
Cisco
Published By: PGi     Published Date: Jul 03, 2018
Most large companies have already made investments in tools that make video webcasting possible. Video is the most vibrant and intimate medium that executives can use to convey information to large, far-flung internal audiences. Video helps keep employees on the same page about company branding, strategic direction, and externally-facing stories and messaging. It facilitates the transparency and authenticity that today’s employees demand. CEOs of large, global corporations are frequently the catalyst for enterprise live streaming because they know they can use it to make a powerful and personal connection with tens of thousands of remote employees—efficiently and cost-effectively. They support using technology to foster communication and transparency, leading to a more engaged, productive workforce. They recognize the power of video. And they see how engaged, satisfied employees can collectively strengthen their company’s competitive advantage and enhance their bottom line. If your CEO
Tags : 
    
PGi
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
20% of customers will be responsible for 80% of profit – or so says The Pareto Principle, also known as the “rule of the vital few.” So, while marketers are trying hard to increase market share, they should be equally (or even more) concerned about nurturing the customer relationships they already have. That means finding ways to strengthen bonds with your best customers and figuring out how to turn good customers into better ones. Personalization, truly helpful support, data-driven contextual marketing, re-engagement strategies, gamification… There’s an almost overwhelming number of options out there, each touted as your golden key to an enduring bond with your users. In the pages that follow, you’ll learn about five strategies to drive engagement and retention with actionable tips from Selligent clients – top brands that are at the forefront of creating and sustaining customer loyalty.
Tags : 
customer engagement, marketing strategy, customer retention, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning, product recommendation
    
Selligent Marketing Cloud
Published By: Mimecast     Published Date: May 15, 2014
This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: NAVEX Global     Published Date: Jul 31, 2018
Learn everything you need to know about creating an engaging training programme—from defining your strategy to measuring effectiveness—in our comprehensive guide. What you'll learn: How to prevent misconduct through training How to create an engaging training programme - from defining strategy to measuring effectiveness How to develop the foundation of an ethical culture Tips, advice and examples to help organisations develop cost-effective, high-value and successful ethics and compliance training programmes How to mitigate risk and promote adherence to compliance objectives How to improve employee engagement and trust and strengthen alignment around a set of core values
Tags : 
    
NAVEX Global
Published By: Silverpop     Published Date: Sep 19, 2011
The most successful marketers will be those who stand out by infusing their content with a more human feel. Here are five tips and tactics guaranteed to strengthen your messages and delight your subscribers.
Tags : 
silverpop, humanizing content, personal attention, social media
    
Silverpop
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: SDL Web Content Management Solutions     Published Date: Mar 02, 2011
Today's marketing and brand management groups are on the front lines of business mandates to grow international revenue, increase worldwide market share, and strengthen the impact of global brands. Businesses reaching for such goals face an environment of unprecedented pressures. How are companies dealing with the demands of multilingual marketing?
Tags : 
multilingual marketing, wcm, branding, sdl, language, lob
    
SDL Web Content Management Solutions
Published By: Epsilon     Published Date: Oct 19, 2012
Unlock the Mystery of Predictive Modeling -- Retailers that use customer transactional data to their advantage, coupled with other database elements, can learn how to build solid customer relationships and strengthen their ROI.
Tags : 
modeling, epsilon, marketing, marketing research, roi, transactional data
    
Epsilon
Published By: CDW-Apple     Published Date: Dec 11, 2012
Simplify management, strengthen security, and improve productivity with managed mobile applications.
Tags : 
mobile applications, business mobile applications, application management, mobile it integration, mobile it
    
CDW-Apple
Published By: Polycom     Published Date: Mar 13, 2015
As the financial services industry moves away from its historic focus—on high margin business, banking, brokerage, insurance, trading, wealth management, and payment companies—they must rethink and strengthen the ways they interact with markets and customers. Organizations that fail to provide personalized services for their clients or to satisfy increasingly demanding customers will struggle to keep their position as competitors innovate at every turn.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication
    
Polycom
Published By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
    
OKTA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 02, 2015
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
ibm, release management, business needs, market trends, customer demands, deploy application, best practices, it management, enterprise applications
    
IBM
Published By: Mimecast     Published Date: Nov 10, 2010
The right archiving solution can simplify and strengthen your overall email management systems and processes.
Tags : 
mimecast, software as a service, saas email archiving, email management system
    
Mimecast
Published By: Citrix Systems     Published Date: Sep 06, 2013
Regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, security, desktop virtualization, strengthen information, reduce risk, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 06, 2013
Empowering Information Security with Desktop Virtualization
Tags : 
citrix, security, desktop virtualization, strengthen information, reduce risk, byod, it management, enterprise applications
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, information security, desktop virtualization, virtualization, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : 
information security, layered approach, mobility, application, desktop virtualization
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.