Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

tactics

Results 151 - 175 of 304Sort Results By: Published Date | Title | Company Name
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: EMC Converged Platforms     Published Date: May 26, 2016
Land Rover BAR has sharpened its competitive edge with VCE VxRail™ Hyper-converged Infrastructure Appliance incorporating VMware virtualization and EMC VNX storage and Isilon, to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
infrastructure management, business management, best practices, application performance, application management, network management, network performance, network performance management
    
EMC Converged Platforms
Published By: Marketo     Published Date: Mar 22, 2018
The Engagement Economy—the reality that we consume and market in today—is a new era where everyone and everything is connected. And in this reality, consumer expectations have shifted to require more from the brands they buy from—they seek a personal relationship that offers them value wherever they are and whenever they are ready to engage. As the Engagement Economy matures, marketers must rapidly transform their strategies, methods, and tactics in order to stay relevant. The State of Engagement offers insights on engagement from over 2,000 global consumers and marketers. Download The State of Engagement to explore how: Consumers feel marketers are faring in making them feel wanted, understood, and connected to their brands Marketers and their organizations are engaging their consumers, employees, and partners Marketers can address the gaps between their activities and consumer perception
Tags : 
    
Marketo
Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection, it management
    
Webroot UK
Published By: Windstream     Published Date: Feb 09, 2015
The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.
Tags : 
windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing, data center, innovation, strategy, expansion, customer service, agility, migration, performance, complexity, system, value, roi
    
Windstream
Published By: Uberflip     Published Date: Jun 30, 2017
This eBook aims to provide you with an advanced understanding of content distribution in the B2B space, as well as provide an inside look at the tactics and channels (including social, organic search, email, and paid programs) you need to be leveraging to effectively distribute your content to your audience.
Tags : 
content distribution, ebook, delivery, channels, goals
    
Uberflip
Published By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : 
advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics, security, it management
    
Niara
Published By: Bizible     Published Date: Jun 19, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
pipeline marketing, full-funnel marketing, revenue marketing, b2b marketing, conversion tactics, growth marketing, growth hacking, demand generation, demand gen, lead gen, lead generation, marketing data
    
Bizible
Published By: Magento     Published Date: Feb 15, 2018
This is a great opportunity to discuss the critical aspects of what makes B2B eCommerce successful. Join Magento Commerce, Magento Solution Partner, Monsoon Consulting, and leading UK supplier and industry leader in B2B online sales, Brymec, for The Anatomy of B2B Success webinar. In this webinar, Peter Sheldon shares how digital transformation is driving B2B online sales growth and provide tips on current eCommerce executive thinking. Guy Hewison and Russell Schlaudraff from Brymec share how they are delivering the ‘future of online ordering.’ If you are serious about growing your B2B eCommerce, discover: What's driving the move to online ordering and self service in B2B The importance of understanding who your customers’ buyer really is The common challenges and pitfalls B2B companies face with implementations Advice from Brymec for sourcing a B2B eCommerce platform Tactics for growing online sales and providing a better customer experience
Tags : 
    
Magento
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi, security, network security
    
GFI
Published By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : 
supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories, supplier, application integraion, eai, plm, product lifecycle management, van, value add, value added, inventory management
    
Inovis
Published By: Sage     Published Date: Jan 30, 2015
Human resources departments continue to struggle to build the best workforce. There are plenty of applicants but not enough candidates with the right combination of skills, experience, work ethic, and attitude to be top performers. The success of any organization depends on its people. Employees are a company’s greatest asset—and that asset must be managed to yield positive results. At Sage, we call this the Return on Employee Investment, or ROEI. This guide provides tactics and tips to help you improve the effectiveness of your company’s recruiting, hiring, and onboarding processes.
Tags : 
sage, recruiting, hiring, onboarding, roei, work ethic, skills
    
Sage
Published By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : 
vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency, it management, enterprise applications
    
VMTurbo
Published By: ThreatTrack Security     Published Date: May 21, 2015
This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.
Tags : 
threattrack, cyber security, attacks, protection, security
    
ThreatTrack Security
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
Published By: AWS     Published Date: Nov 28, 2018
Financial institutions run on data: collecting it, analyzing it, delivering meaningful insights, and taking action in real time. As data volumes increase, organizations demand a scalable analytics platform that can meet the needs of data scientists and business users alike. However, managing an on-premises analytics environment for a large and diverse user base can become time-consuming, costly, and unwieldy. Tableau Server on Amazon Web Services (AWS) is helping major Financial Services organizations shift data visualization and analytics workloads to the cloud. The result is fewer hours spent on manual work and more time to ask deeper questions and launch new data analyses, with easily-scalable support for large numbers of users. In this webinar, you’ll hear how one major asset management company made the shift to cloud data visualization with Tableau Server on AWS. Discover lessons learned, best practices tailored to Financial Services organizations, and starting tactics for scalable analytics on the cloud.
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: Nov 28, 2018
Damaging widespread attacks such as WannaCry provide grim reminders of how prevalent Ransomware attacks have become. Adversaries are not only launching Ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and procedures (TTPs) to foil your organization’s best cybersecurity strategies. A white paper, “Ransomware, a Growing Enterprise Threat,” offers in-depth analysis of Ransomware and explains why organizations can’t afford to ignore this increasingly challenging cyber threat. Download this white paper to learn • The evolution of Ransomware and why businesses are being targeted more frequently • How perpetrators tactics and targets are evolving to maximize profits • Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
    
CrowdStrike
Published By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : 
technology, forum, workforce, workers, business, security
    
Insight
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security
    
Symantec.cloud
Published By: Unica     Published Date: Sep 08, 2010
Good marketers are going where their customers are - that means social media. According to a recent Unica global survey of marketers, 47% of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58%. Yet, for all the rush, many marketers are wondering, "where's the gold?" Download the white paper, "From Social Media Hype to Social Media Marketing" and learn how to build a stronger customer relationship."
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, customer relationships, social media, crm
    
Unica
Published By: Eloqua     Published Date: Sep 28, 2011
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting
    
Eloqua
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.