profile

Results 251 - 275 of 285Sort Results By: Published Date | Title | Company Name
Published By: MoreVisibility     Published Date: May 07, 2012
When it comes to Social Media Marketing, setting up your business pages and profiles is only the first step. How do you grow and maintain an active social media audience? In this White Paper we explore key ideas for making your social media content more engaging for prospects and customers.
Tags : 
morevisibility, social media, google, internet marketing, emerging marketing, marketing tools, marketing campaigns
    
MoreVisibility
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption
    
Symantec.cloud
Published By: Profiles International     Published Date: Aug 30, 2010
Download this guide we'll provide you with the Top 5 Strategies for Motivating and Retaining Top-Performing Employees: Employee Orientation, Performance Evaluations, Occupational Assessments, Succession Planning
Tags : 
retention, keeping employees
    
Profiles International
Published By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator, secure copy, service explorer, security explorer, enterprise security reporter, scripting, drive mapping, printer deployment, roaming profiles, outlook profiles, group policy management, server management, ntfs permissions
    
ScriptLogic
Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus
    
Avocent
Published By: Dell Storage     Published Date: Apr 21, 2011
The Dell Compellent vSphere Plug-In currently under development will enable data center administrators to manage many aspects of Dell Compellent Fluid Data storage directly through the VMware vSphere client. This demo video shows how to leverage the integration to provision and map storage volumes for VMFS datastores, create storage profiles for automated tiering and continuous snapshots, and recover datastores to virtually any point in time - all through a single interface. (4 min)
Tags : 
dell compellent, server, storage, vmware vsphere, integration, compellent vsphere plug-in, fluid data storage
    
Dell Storage
Published By: Berkshire Associates     Published Date: May 09, 2011
Berkshire's white paper examines the different compliance needs in the Manufacturing, Healthcare, and Finance Industries
Tags : 
affirmative action, manufacturing, finance, health care, compliance, human resources, ofccp
    
Berkshire Associates
Published By: Symantec     Published Date: Oct 02, 2012
Stuxnet,a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
malware, code, signing, certificates, software, stuxnet
    
Symantec
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Taneja Group Solution Profile takes a closer look at what business continuity means in a storage system, and examines the approaches that vendors typically take to providing it. This paper looks into HP3PAR StoreServ 7000 and more.
Tags : 
san storage, intel, intel, hp 3par, hp storeserv
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
The data captured in this Technology Adoption Profile from Forrester shows that the time is now for firms to reduce capital and operating expense through improved tools and processes where excess exists.
Tags : 
future proofing, data center, storage, forrester research, hp intel, hp 3par
    
Sponsored by HP and Intel® Xeon® processors
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper, downtime, continuity plan, continuity tools
    
NETIQ
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees
    
HP and Intel ®
Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection
    
Symantec
Published By: Adobe     Published Date: Aug 14, 2014
Adobe received the highest score for current digital experience (DX) delivery offerings in The Forrester Wave™: Digital Experience Delivery Platforms, Q3 2014 report. And, we’re continuing to innovate. Since the evaluation, we’ve launched several new capabilities that include richer support for mobile apps, increased usability through visual workflows, and a master marketing profile. Read the report to see why Adobe was named a Strong Performer and to learn more about: -The DX challenges that companies face and how they’re addressing them -The array of tools and technologies available in digital experience delivery platforms -The journey to unified, cross-channel digital experiences “Strategically, Adobe differentiates with its vision of the connective tissue between its tools, and its aim for single customer profile.” – Forrester Research, Inc.
Tags : 
digital experience, delivery platforms, mobile apps, software vendors
    
Adobe
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
McAfee
Published By: ADP     Published Date: May 04, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 18 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
    
ADP
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: Dell EMC     Published Date: Aug 03, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation, it initiatives, storage management
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 03, 2015
See how XtremIO powers high-performance and high ROI for global application delivery for McCoy Global.
Tags : 
performance, roi, global application
    
Dell EMC
Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data
    
IBM
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Recent high-profile data breaches and numerous waves of widely publicised internet attacks have made everyone nervous about security. Families, small businesses and other organisations are struggling to figure out how to protect themselves.
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: