age

Results 51 - 75 of 21605Sort Results By: Published Date | Title | Company Name
By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
     Tenable
By: VMS     Published Date: Jul 16, 2009
As a marketer you know that there is no singular silver bullet that will suddenly elevate your communications to a point where everyone runs out to buy your product. That's why it is important to understand the importance of an integrated approach for your communications strategies and learn how to monitor them. Read this study to learn how major brands address the issue and coordinate their Advertising and PR efforts.
Tags : advertising, marketing, vms, social media, roi, vantage
     VMS
By: Castlight Health     Published Date: Aug 02, 2016
In this report by Forrester Research, find out what 120 executives in the US with influence and decision-making responsibility regarding healthcare management do to manage costs and increase employee engagement.
Tags : 
     Castlight Health
By: AMD     Published Date: Jul 20, 2012
Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : virtualization, it support, it management, data managemtn, cloud computing, cloud network, virtual server performance, data migration
     AMD
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
     Limelight
By: iCims     Published Date: Apr 01, 2015
Achieving your strategic goals starts with finding the best-fit recruitment technology for your business. Learn how iCIMS' solution can give you the competitive advantage in today's hiring landscape.
Tags : recruiting, staffing, hiring
     iCims
By: IBM     Published Date: May 16, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
     IBM
By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
     IBM
By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : digital interaction, experience design, interactive experience, cross functional collaboration, customer experience, integrated data
     IBM
By: Henry Jhonson     Published Date: Feb 01, 2011
In over forty pages this guide tackles every Twitter feature, tip and trick you can think of. Learn to work the interface, to Tweet from your desktop, cool Twitter bots and which people to follow.
Tags : twitter, tricks, tips, social, media, optimization, guide, whitepaper
     Henry Jhonson
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: Dell EMC     Published Date: Aug 22, 2017
Dell EMC Isilon® scale-out NAS is the ideal platform to store, manage, protect and analyze your unstructured data. Isilon is the only platform that scales capacity and performance in minutes – allowing you to infinitely consolidate unstructured data, cut costs, and gain new levels of agility and insight to accelerate your business.
Tags : 
     Dell EMC
By: Advertising.com Sponsored Listings     Published Date: Dec 12, 2011
Advertising.com's premium sponsored listings network gives you an unmatched ability to target your text ads by site, section, or page on the web's most popular sites.
Tags : cpc, advertising.com, text ads, contextual ads, contextual advertising, search ads, search advertising
     Advertising.com Sponsored Listings
By: VIDEOHUB     Published Date: Mar 14, 2012
When you sign up and complete $2500 worth of advertising on Videohub Marketplace, we add $500 to your account, which you can use immediately in crease your reach or save for a future campaign.
Tags : acudeo, adwords, beet tv, bright cove, buy video ad, dealer marketing, google ad, hotel marketing
     VIDEOHUB
By: IBM     Published Date: Nov 13, 2014
This webcast examines a large government agency struggling to provide stable test environments to support their partner landscape. Learn how service virtualization was used to simulate their department's core systems for a lower risk, less expensive, and stable testing environment.
Tags : service virutalization, core systems, testing environments, it management, enterprise applications
     IBM
By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
     IBM
By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
     IBM
By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
     Group M_IBM Q418
By: IBM     Published Date: Jul 26, 2017
A rewarding customer experience is the central aim for luxury gift company 1-800-Flowers.com: a fast, intuitive shopping process helps keep consumers loyal to its brands. Working with IBM, the company has built a master data management (MDM) system that helps deliver a more seamless experience to shoppers across multiple brands and channels.
Tags : 1 800 flowers, ibm, e-commerce, case study, master data management
     IBM
By: Jamf     Published Date: Nov 05, 2018
This year higher education IT teams have focused on improving student outcomes by supporting success initiatives through technology. In this white paper, learn how 1-to-1 iPad programs can drive improved student outcomes through student wellness, engagement and career readiness. Also, gain helpful insight on how to start, manage and thrive with your own 1-to-1 iPad program.
Tags : 
     Jamf
By: Avere Systems     Published Date: Jun 27, 2016
This white paper reviews common HPC-environment challenges and outlines solutions that can help IT professionals deliver best-in-class HPC cloud solutions—without undue stress and organizational chaos. The paper: • Identifies current issues—including data management, data center limitations, user expectations, and technology shifts- that stress IT teams and existing infrastructure across industries and HPC applications • Describes the potential cost savings, operational scale, and new functionality that cloud solutions can bring to big compute • Characterizes technical and other barriers to an all cloud infrastructure and describes how IT teams can leverage a hybrid cloud for compute power, maximum flexibility, and protection against locked-in scenarios
Tags : 
     Avere Systems
By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
     Lumesse
By: Uberflip     Published Date: Jan 03, 2019
No matter what industry you’re in or role you have, we all share a universal interest in trends. As marketers, we look to Google Trends to understand what keywords and search terms are most popular; we look for trending hashtags and conversations on social to inform the content we put out; and we put “Trends” sessions on our agendas at conferences because we know they’ll draw an audience. We’ve tapped into this almost universal desire to understand what the masses are doing.
Tags : 
     Uberflip
By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
     PC Mall
By: newScale     Published Date: Jan 30, 2008
This white paper outlines the challenges associated with IT Request Management and ten best practices that represent the hard-won knowledge from dozens of successful Service Request Management projects. By following these guidelines, your IT organization can provide more responsive service delivery, increase operational efficiency, and improve internal customer satisfaction.
Tags : itil, service catalog, service catalogue, itil service catalogue, it service catalogue, best practices, service management, customer service
     newScale
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com