lease

Results 276 - 300 of 453Sort Results By: Published Date | Title | Company Name
By: Engagio     Published Date: Oct 10, 2019
Read the report today! Want to make sure you're investing in the right ABM technology? Research in Action released the Top 20 Global Vendors for ABM in 2019 using their proprietary Vendor Selection Matrix™, and Engagio was the #1 Global winner! Read the report to learn why Engagio placed #1 based on 1,500 customer interviews and Research in Action's independent analysis of each vendor. Read the report to discover: The top 20 global ABM providers and how they measure up How to select the right technology for your ABM needs 5 insights and predictions for ABM by Research in Action
Tags : 
     Engagio
By: Epsilon     Published Date: Jun 22, 2012
Epsilon and the Direct Marketing Association's Email Experience Council released the Q1 2012 North America Email Trends and Benchmarks which show a steady increase in open rates over both Q4 2011 and Q1 2011.
Tags : epsilon, marketing, email marketing, marketing trends, email trends
     Epsilon
By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
     Centrify Corporation
By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
     Mimecast
By: MoreVisibility     Published Date: Dec 19, 2017
Google has recently released several new products. One of the best visualization tools to hit the market is Google Data Studio. Not only is this product free to all Google Accounts, it’s a great way to visualize your data into a comprehensive report for your business. Here, we will highlight 5 reasons why you should be leveraging Google Data Studio to enhance your reporting.
Tags : 
     MoreVisibility
By: Kaseya     Published Date: Feb 16, 2011
The goal for this suite is to give you ITIL in a box. This release includes Incident Management, Service Request Management, Problem Management and Change Management.
Tags : kaseya, itil, incident management, service request management, problem management, change management, service desk
     Kaseya
By: SugarCRM     Published Date: Jan 17, 2014
The latest release of SugarCRM’s flagship product gives users new tools to build extraordinary customer relationships. Read an in-depth analysis of SugarCRM’s enhanced ability to help companies execute their customer-facing initiatives from Ovum, a leading technology research firm.
Tags : swot assessment, sugarcrm, catalyst, software, crm, sugarcrm v7, relationship management, customer relationship
     SugarCRM
By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
     Intralinks
By: Dropbox for Business     Published Date: May 07, 2015
Over the past year, Dropbox has released several sets of improvements to its Dropbox for Business product aimed at small business and team use.
Tags : enterprise, collaboration strategies, content management, content strategies, usability, enterprise applications
     Dropbox for Business
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : alert logic, rackspace, pci, dss, compliance, security, it management
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : alert logic, sungard, pci, dss, compliance, security, it management
     Alert Logic and Sungard Availability Services
By: DocuSign     Published Date: Jun 25, 2014
Agile development cycles churn out new releases of disruptive technologies as often as every quarter, making the high-tech industry one of unpredictable product cycles and rapid growth. Success in the unpredictable high-tech industry demands improving profitability while regulating costs.
Tags : docusign, high-tech, esignatures, technologies, rapid growth, speed, expand globally, it management
     DocuSign
By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
     HP
By: AWS     Published Date: Jul 24, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
     AWS
By: IBM     Published Date: Sep 08, 2015
Please join us for an in-depth discussion of the latest data and analytics capabilities that banks are using today to uncover new customer insight - at the individual level - to improve offers and cross sell, optimize campaigns and deliver profitable revenue. The discussion will explore how leading banks are employing predictive analysis on customer data not often analyzed - like individual transactions, interactions, behavior and social media. See how banks can move beyond traditional segmentation and enable marketing to the "Segment of One."
Tags : banking, finance, customer engagement, analytics, insights, segmentation, data management
     IBM
By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : ibm, blockchain, electronics
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     BlackBerry Cylance
By: NewField IT     Published Date: Aug 19, 2008
In 2001, the international research group, Gartner released a briefing paper titled 'Rightsizing Output Fleets – The Hidden Gold Mine'. This research paper identified total print costs to be as much as 1-3% of an organization's revenue, a figure far higher than anyone had previously suggested. Gartner argued that print costs are so high they offer a 'goldmine' for any procurement or IT manager looking for savings.
Tags : 
     NewField IT
By: Numara Software     Published Date: Jul 16, 2009
Software Compliancy issues are time consuming and are an expensive undertaking. See how easy Software Compliance can be with Numara® Track-It! ®. Software License Management is included with the Numara® Track-It! ® Audit license at no extra cost! • Manage Software Serial numbers and activation keys • Understand which software you own, lease or rent; where they are located and when they expire • Easily identify assets which may have license overages • Fully integrated with the Numara® Track-It!® Inventory and Purchasing modules 
Tags : software compliancy, numara, track it, software license management, audit, purchasing, inventory, license overage
     Numara Software
By: Electric Cloud     Published Date: Nov 04, 2009
This paper looks at the needs of build and release management, how those needs are met by open source and commercial tools that go way beyond the likes of Make or Ant, and the real costs of creating and maintaining a homegrown system.
Tags : electric cloud, electriccommander, build system, feedback, continuous integration, build script, software development, build and release management
     Electric Cloud
By: Microsoft Corporation     Published Date: Oct 19, 2010
Interested in the getting a close look at Microsoft® Online Services in action? If so, please join us for the Microsoft-led webinar, Microsoft Online Services.
Tags : microsoft online services, end-user experiences, administration, migration, configuration, sharepoint
     Microsoft Corporation
By: Taleo     Published Date: Mar 30, 2012
This study covers how to do each of these things effectively and includes examples from companies such as Cargill and Savannah River Nuclear Systems.
Tags : alere, hr management, human resources, workforce, talent analytics, talent acquisition, talent management, performance management
     Taleo
By: Apple Corporation     Published Date: Jan 04, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
     Apple Corporation
By: Port25 Solutions     Published Date: Mar 09, 2012
The PowerMTA Management Console (PMC), v1.0, is a newly released web based enterprise and a scalable software solution. PMC allows for the centralized configuration, monitoring, and reporting of multiple PowerMTAT installations.
Tags : smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting
     Port25 Solutions
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com