Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 301 - 325 of 3498Sort Results By: Published Date | Title | Company Name
Published By: BitDefender     Published Date: Feb 01, 2012
#1 Ranked Antimalware Engine! It's light, flexible & designed for SMBs!
Tags : 
bitdefender, free trial, smb, management, security, technology, vb100 awards
    
BitDefender
Published By: BitSight Technologies     Published Date: Jun 12, 2015
Gartner has named BitSight Technologies a “Cool Vendor” in Vendor Management for 2015. This report highlights three vendors for offering “tools and services to support vendor risk management and improve performance visibility.” Download this paper to learn how BitSight processes and synthesizes terabytes of data to create security ratings, and how a leading North American Bank uses BitSight Security Ratings in their vendor risk management program.
Tags : 
bitsight, technologies, gartner, cool, vendor, data, risk
    
BitSight Technologies
Published By: BizNet Software     Published Date: Jan 19, 2011
An Rx For Replacing FRx - 10 considerations that ensure your replacement becomes an improvement
Tags : 
frx, financial reporting, replacement, excel
    
BizNet Software
Published By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure, uc solutions, mobility solutions, cloud solutions, enterprise business solutions, data center cloud service, it disaster recovery, network services, video collaboration
    
Black Box
Published By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : 
blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 23, 2010
With sleek designs and a variety of user-friendly features, smartphones have implanted themselves on the public's consciousness-so much so that one leading industry research firm reports that a record 54.5 million such mobile devices were shipped in the fourth quarter last year. With sales rising nearly 40 percent over the same quarter in 2008, the message is clear: Smartphones are hot, and not just for mobile workers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : 
blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry, wireless
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
When it comes to the office of the future, what many people envision is not an office at all -- it's access to the tools and resources they need without going to an actual office. This white paper discusses how to deliver this level of access today.
Tags : 
mobile computing, mobile workforce, mobile office, blackberry
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
NSS Labs Names Cylance a "Recommended" Leader in 2017 Advanced Endpoint Testing. See how 14 anti-malware products performed in NSS Labs tests.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Blackboard     Published Date: Jan 24, 2017
When it comes to a new learning environment, the IT team must make itself heard – or the whole implementation could go badly wrong.
Tags : 
new learning environment, tech for learning, tech for education, tech, education, it management
    
Blackboard
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat demonstrated bandwidth reduction of up to 95%, and up to 40 times faster response time across all the WAN conditions. Find out more about how the joint solution provides a tremendous improvement in the user experiences of SAP BusinessObjects Enterprise for all WAN conditions tested in this complimentary white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, infrastructure, wide area networks
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service, technology, strategy, networking, it management, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
strategies, saas, application, lob, bluecoat
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile, security, devices, users, bluecoat
    
Blue Coat Systems
Published By: Bluecore     Published Date: May 14, 2018
After decades in the limelight, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages. To better understand how retailers are using email, including the extent to which they have embraced individualized messaging opportunities and the effectiveness of those messages, Bluecore turned to the data. Our 2018 Retail Email Benchmark report provides a baseline understanding of these a
Tags : 
    
Bluecore
Published By: Bluecore     Published Date: Oct 23, 2018
AFTER DECADES IN THE LIMELIGHT, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages.
Tags : 
bluecore, retail, email, report, ecommerce, marketing
    
Bluecore
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.