Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

links

Results 101 - 125 of 140Sort Results By: Published Date | Title | Company Name
Published By: MarkMonitor®     Published Date: Apr 25, 2013
Learn how U.K. jeweler, Links of London, beat back the counterfeiters, increasing their web traffic by 50% and reducing their CPC spending on branded terms by 41%!
Tags : 
driving traffic, increase web traffic, reduce spending, brand protection, brand protection strategies, cut cpc spending
    
MarkMonitor®
Published By: McAfee     Published Date: Apr 14, 2014
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
vpn, virtual private network, next generation firewall, mpls, bgp, high availability vpn, multiprotocol layer switching, security, it management
    
McAfee
Published By: McAfee     Published Date: Aug 21, 2014
Uma rede privada virtual (VPN, Virtual Private Network) proporciona o melhor retorno do investimento em proteção de comunicações. Porém, a falta de confiabilidade nos links da VPN é um fator de risco para comunicações críticas dentro das organizações. As redes constantemente disponíveis dependem de diversos provedores de serviços de Internet para garantir conectividade permanente e maior largura de banda. A aVPN (Augmented VPN) agrega todos os links dos provedores de serviços de Internet para disponibilizar um único túnel de alta capacidade. A aVPN é um modo simples e econômico de criar conexões rápidas, seguras e de alta capacidade entre sites, bem como garantir uma conectividade sem interrupções. Ela foi desenvolvida pensando na facilidade de uso e sua implementação não exige equipamentos/softwares especiais ou contratos de troca de tráfego com provedores de serviços de Internet.
Tags : 
vpn, rede privada virtual, firewall de próxima geração, mpls, bgp, vpn de alta disponibilidade, segurança, gerenciamento de ti, next generation firewall, ngfw, avpn, augmented vpn, security
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
asset, networking
    
McAfee
Published By: Medium Blue     Published Date: Jan 29, 2007
Learn how an organic SEO firm works with site content instead of manipulating technical loopholes, attracts links instead of utilizing linking schemes, strives to make a website a valuable resource, and learns from the search engines rather than learning how to exploit them.
Tags : 
organic seo, search marketing, search engine optimization, medium blue
    
Medium Blue
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 25, 2016
Over the years, two major approaches to SERDES simulation have emerged and gained popularity: time-domain (or bit-by-bit) and statistical. Both are used to build the eye diagram and bit-error ratio (BER), and each has its benefits and limitations.
Tags : 
mentor graphics, analysis flow, bit by bit, serdes, ber, gigabit networking, internetworking hardware
    
Mentor Graphics
Published By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
spam, anti-spam, anti spam, email security, trojan, hacker, messagelabs, message labs, colocation and web hosting
    
MessageLabs
Published By: MessageLabs     Published Date: Jan 13, 2009
Uncontrolled internet use brings web-malware, malicious links and Trojans to the corporate network.  Uncover the web security options available to your business.  Choosing the right solution can be complicated. FREE Web-filtering Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, web-filtering, web-filtering buyer’s guide, web-malware, malicious links, trojans, web security solution, security
    
MessageLabs
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Moxie     Published Date: Feb 08, 2018
Live online chat is proving to be a successful way to fulfill consumers’ desire to connect with companies. In the Guided Economy, customers expect chat to be consistently easy and effective at answering their questions and resolving their issues. It may seem hard to provide a consistent experience because each chat engagement poses a unique question on a unique subject from a unique customer. But by focusing on how best to engage with customers via chat, this channel can become one of your most powerful sales tools.
Tags : 
digital, conversions, hyperlinks, customers, mobile, chat
    
Moxie
Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global
Published By: Optify     Published Date: Aug 03, 2012
This is a must-read guide for B2B inbound marketing professionals. Learn safe strategies to get more high-quality inbound links and traffic from your SEO, content marketing and social media campaigns.
Tags : 
inbound marketing, b2b, lead generation, seo, search engine optimization, content marketing, social media
    
Optify
Published By: Optify     Published Date: Aug 13, 2012
This is a must-read guide for B2B inbound marketing professionals. Learn safe strategies to get more high-quality inbound links and traffic from your SEO, content marketing and social media campaigns.
Tags : 
inbound marketing, link building, seo, link acquisition, link strategy, lead generation, search engine optimization, link value, optify
    
Optify
Published By: Oracle     Published Date: Jul 11, 2017
Despite the rise in chat adoption, many organizations are still not providing the service their customers expect. That’s why it’s essential to follow proven best practices, including defining goals, identifying key metrics, and appropriately hiring and training staff. With these foundations in place, organizations can establish routing and queuing practices, before customizing the solution to meet their specific needs, and fine-tuning analytics to further improve performance. To learn more about how Oracle Chat Cloud Service can improve CSAT, customer loyalty, and revenue for your organization, visit oracle.com/goto/chatbestpractices
Tags : 
home page support, faq escalation, points of right-channeling, frustration points, page headers and footers, business driver, chat channel, customer satisfaction, sales, productivity, hyperlinks, mobile users, screen real estate
    
Oracle
Published By: Oracle     Published Date: Sep 27, 2019
HR has never been more in the spotlight. So it’s never been more important to not just store your data, but use it to transform ways of working. This trend-led research report explores how HR leaders need to become data leaders, using connected data to drive innovation, productivity and growth. Discover insights from those leading the way, and delve into the links between transforming culture and significant growth. Read our report for HR leaders now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 24, 2019
HR has never been more in the spotlight. So it’s never been more important to not just store your data, but use it to transform ways of working. This trend-led research report explores how HR leaders need to become data leaders, using connected data to drive innovation, productivity and growth. Discover insights from those leading the way, and delve into the links between transforming culture and significant growth. Read our report for HR leaders now.
Tags : 
    
Oracle
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Despite the rise in chat adoption, many organizations are still not providing the service their customers expect. That’s why it’s essential to follow proven best practices, including defining goals, identifying key metrics, and appropriately hiring and training staff. With these foundations in place, organizations can establish routing and queuing practices, before customizing the solution to meet their specific needs, and fine-tuning analytics to further improve performance. To learn more about how Oracle Chat Cloud Service can improve CSAT, customer loyalty, and revenue for your organization, visit oracle.com/goto/chatbestpractices
Tags : 
home page support, faq escalation, points of right-channeling, frustration points, page headers and footers, business driver, chat channel, customer satisfaction, sales, productivity, hyperlinks, mobile users, screen real estate
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 11, 2017
Despite the rise in chat adoption, many organizations are still not providing the service their customers expect. That’s why it’s essential to follow proven best practices, including defining goals, identifying key metrics, and appropriately hiring and training staff. With these foundations in place, organizations can establish routing and queuing practices, before customizing the solution to meet their specific needs, and fine-tuning analytics to further improve performance. To learn more about how Oracle Chat Cloud Service can improve CSAT, customer loyalty, and revenue for your organization, visit oracle.com/goto/chatbestpractices
Tags : 
home page support, faq escalation, points of right-channeling, frustration points, page headers and footers, business driver, chat channel, customer satisfaction, sales, productivity, hyperlinks, mobile users, screen real estate
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 11, 2017
Despite the rise in chat adoption, many organizations are still not providing the service their customers expect. That’s why it’s essential to follow proven best practices, including defining goals, identifying key metrics, and appropriately hiring and training staff. With these foundations in place, organizations can establish routing and queuing practices, before customizing the solution to meet their specific needs, and fine-tuning analytics to further improve performance. To learn more about how Oracle Chat Cloud Service can improve CSAT, customer loyalty, and revenue for your organization, visit oracle.com/goto/chatbestpractices
Tags : 
home page support, faq escalation, points of right-channeling, frustration points, page headers and footers, business driver, chat channel, customer satisfaction, sales, productivity, hyperlinks, mobile users, screen real estate
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Recorded Future     Published Date: Apr 18, 2019
A very high level look into managing third-party risk in infographic format
Tags : 
    
Recorded Future
Published By: Riverbed     Published Date: Feb 26, 2015
How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e. performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.
Tags : 
private clouds, public clouds, saas applications, vpn lines, hybrid clouds, hybrid enterprise
    
Riverbed
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.