target

Results 376 - 400 of 954Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Infoblox     Published Date: Nov 11, 2008
In August 2008, Computerworld invited IT and business leaders to participate in a core network services survey, that included specific questions about their DNS infrastructures and the costs of IP address management. The survey was fielded via targeted broadcasts to Computerworld customers, as well as through an invitation on Computerworld.com. The survey was commissioned by Infoblox, but the data was gathered and tabulated independently by Computerworld Research. The following report represents top-line results of that survey.
Tags : 
network services survey, ip address management, infoblox, dns infrastructures, computerworld research
    
Infoblox
Published By: Unica     Published Date: Jun 07, 2010
Email excellence is a moving target. Improve your aim and stay on top of the trends. Download Top Email Trends of 2010 to find out what you should watch for and why, and to review the top trends every email marketer must understand in order to remain effective and relevant in the years to come. Learn how to optimize email delivery rates, ensure message integrity and readability, and to protect your online reputation in a rapidly evolving and complex email marketing landscape.
Tags : 
unica, email, emarketing, esp, email trends, social media, spam
    
Unica
Published By: Unica     Published Date: Nov 04, 2010
Facing an unprecedented pace of change, you, like many marketers,may be struggling to create meaningful conversations with your audience.While you may be turning up the volume, if you are still using pushstrategies to shout out your messages, your buyers may be tuningout.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, ebook, integration
    
Unica
Published By: Innotas     Published Date: Jun 16, 2011
How Progressive IT Organizations Are Using Cloud Solutions to Deliver On Time, On Budget, On Quota and On Target with Key Business Initiatives
Tags : 
project portfolio management, it governance, it management, ppm, it efficiency, cloud, saas, it project management
    
Innotas
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder
    
Citrix Systems
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
View this on-demand webcast to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, sustainability goals, environmental
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
Download this white paper to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, sustainability, environmental sustainability, energy goals, energy performance
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Apr 23, 2012
View this on-demand webcast to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, eam, asset management, workplace solutions
    
IBM US Smarter Buildings
Published By: LogMeIn     Published Date: Oct 08, 2015
This eBook reveals the 5 best practices to emerge from data to help enable sales teams exceed targets.
Tags : 
optimise sales revenue, sales, social selling, optimise virtual selling, social media
    
LogMeIn
Published By: Bluekai     Published Date: Aug 10, 2012
How can you analyze ALL of your disparate first and third-party audience, campaign and performance data in one central place? How can a DMP power a 360 approach to audience data management and analysis to get more bang out of your marketing dollar?
Tags : 
dmp, data management platform, crm, analytics, audience targeting, predictive audience analytics, real-time campaign analytics, campaign performance, emerging marketing, internet marketing
    
Bluekai
Published By: Merkle     Published Date: Oct 19, 2012
As media and channels proliferate with the upsurge in digital touchpoints, we have access to massive volumes of customer data. This leads to the personalization of customer interactions that drive customer strategy as a business strategy.
Tags : 
brand experience, customer experience, customer insights, communication management, marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, measurement, marketing strategy, competitive advantage, business strategy, customer value
    
Merkle
Published By: Merkle     Published Date: Oct 19, 2012
An effective marketing investment strategy will help you take inventory of your current measurement framework and develop a more accurate, reliable and consistent strategy for assessing and improving the performance of your marketing spend.
Tags : 
marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, optimization, integrated marketing strategies, integrated, customer experience
    
Merkle
Published By: Merkle     Published Date: Oct 19, 2012
An integrated customer communication strategy places customer needs, behaviors and value at the center of all interactions and will result in increased revenue, profit and shareholder value.
Tags : 
data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, kpi, optimization, integrated marketing strategies, integrated, emerging marketing, internet marketing
    
Merkle
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn how Crimson Hexagon developed a framework for measuring advertising effectiveness by analyzing the online conversations surrounding Target's major Black Friday ad campaigns in 2011 and 2012.
Tags : 
campaign effectiveness, ad campaign effectiveness, online conversation, ad agencies, ad appraisal, social media
    
Crimson Hexagon
Published By: McAfee     Published Date: Jan 23, 2013
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats.
Tags : 
network security, intrusion prevention system, ips
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.
Tags : 
rootkit, deep defender, application control, change control, black listing, white listing, security compliance, trusted memory services layer, tmsl, virtual machine security, hardware assisted security, hardware enhanced security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting
    
McAfee
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: