profile

Results 176 - 200 of 285Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Feb 12, 2013
An optimized WAN environment can increase network reliability and availability and improve cost profiles. It also improves the performance and reliability of data backup, replication, and recovery processes.
Tags : 
virtualization, wan, optimization, data center, network, reliability, high availability
    
Silver Peak
Published By: ClearSlide, Inc     Published Date: Nov 06, 2013
This Clearslide-commissioned profile of US enterprise sales leaders evaluates the current adoption trends surrounding sales engagement platforms as well as the challenges that sales leaders and sellers face, based on Forrester's own market data and a custom study of the same audience.
Tags : 
sales engagement plafform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tools, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide, Inc
Published By: ClearSlide, Inc     Published Date: Jan 28, 2015
This ClearSlide-commissioned profile of US enterprise sales leaders evaluates the current adoption trends surrounding sales engagement platforms as well as the challenges that sales leaders and sellers face, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
sales, increasing productivity, increasing revenue, sales performance optimization, sales performance, sales engagement, emerging marketing, marketing research
    
ClearSlide, Inc
Published By: Marketo     Published Date: Jun 06, 2016
Download this complimentary marketing automation buyer’s guide from TrustRadius, the most trusted research platform for business technology. This guide, which places Marketo in the Top Rated category, is based upon a distillation of 1,650 in-depth reviews of 20 leading marketing automation (MA) software products on TrustRadius. In it, you’ll get tips for succeeding with marketing automation and detailed profiles of each marketing automation platform from its end users.
Tags : 
marketo, marketing automation software, marketing, emerging marketing, traditional marketing
    
Marketo
Published By: Yesler     Published Date: Oct 29, 2014
Today’s B2B buyers are on the hunt for information. Your job as a marketer is to provide them with the content they are looking for - but first you have to know who they are and what they need to know. Get to know your buyers better by building composite profiles that describe their pain points, motivations, definitions of success, preferred communication channels, and more.
Tags : 
buyer personas, b2b buyers, content marketing, communication channels, content maps, b2b marketing, buyer journey, market research, lead generation, marketing research
    
Yesler
Published By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: SnowFlake     Published Date: Jul 08, 2016
This EMA case study profiles the implementation of the Snowflake Elastic Data Warehouse, a new generation of cloud-based data warehouses, by Accordant Media. This document details significant tangible and intangible improvements and opportunities the Snowflake solution created for the Accordant Media infrastructure and analytical teams.
Tags : 
snowflake, media, data, technology, cloud-based data, best practices
    
SnowFlake
Published By: Profiles International     Published Date: Apr 08, 2011
Employee assessments can give organizations and managers consistent, in-depth, and objective information about their people. This Information helps leaders and managers rely less on gut instinct and make smarter people decisions.
Tags : 
employee assessment, job performance, hard skills, soft skills, job matching, employment lifecycle, productivity, roi, engagement, retention, organizational culture, climate, acquisition, utilization, efficiency, team chemistry, potential, solutions
    
Profiles International
Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics
    
IBM
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : 
application fabric, performance computing, application performance, grid computing, infrastructure, appistry
    
Appistry
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : 
iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading
    
Iovation
Published By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
    
ZoomInfo
Published By: iCims     Published Date: Oct 02, 2015
Did you know that 88% of all job seekers have at least one social networking profile? Because of this, 92% of companies have used or plan to use social media to recruit. If businesses aren't using social media for recruiting, they can potentially miss candidates that wouldn't be found elsewhere. Don't let your competition find these great candidates first, and even worse, your competition can find these great candidates.
Tags : 
social and mobile, social, mobile, icims, enganging candidates, reaching candidates, talent platform, social mobile recruiting, best candidates, social media recruiting platform
    
iCims
Published By: IBM     Published Date: Nov 09, 2011
Learn how Unica provides a MAP with a high level of customizable business rules and processes!
Tags : 
marketing, map, marketing automation, sirius assesments, unica
    
IBM
Published By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : 
securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes, ddos, denial of service
    
SPAN Systems
Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software
    
Secunia
Published By: Polycom     Published Date: Sep 15, 2015
Polycom voice solutions for Microsoft Lync helped the Organization profiled achieve the following benefits (risk and present value [PV] adjusted) over three years: Improved productivity and collaboration: $12,341,123. Employee relocation cost savings: $452,351. Phone purchase and installation savings: $1,988,182. Managed services cost savings: $582,269. Total cost savings and benefits: $15,363,925.
Tags : 
collaboration, communications, conferencing, lync, microsoft, phone, polycom, skype, video, voice over ip
    
Polycom
Published By: IBM     Published Date: Dec 04, 2015
Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : 
ibm, engagement, marketing, customer profiles, customer insight, telecommunication, crm & customer care
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: IBM     Published Date: Sep 15, 2014
This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.
Tags : 
global banking, banking solutions, fis outsourcing, banking information technology, flash technology
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk
    
IBM
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: