dam

Results 701 - 725 of 915Sort Results By: Published Date | Title | Company Name
By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach, hackers, business security, security
     bitglass
By: Act-On     Published Date: Aug 18, 2014
Lead scoring is a key missing link in many B2B marketing strategies. A growing number of B2B marketers understand this vital role lead scoring plays in the marketing process. Yet they still face challenges getting started with lead scoring and learning how to generate a measureable ROI from their efforts. In this whitepaper you will learn seven foundational steps your company can take to set up a functional and cost-effective lead scoring strategy. These include understanding the fundamentals of lead scoring; learning how to identify the traits that define your ideal sales prospects; and building a system that will grow with your organization over time.
Tags : act-on, marketing, integration, lead scoring, b2b, strategy, roi
     Act-On
By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
     ExactTarget
By: HP     Published Date: Aug 08, 2014
Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance business continuity and resiliency.
Tags : it organizations, storage, commvault simpana, data protection, recoverability, enterprise, data, storeonce
     HP
By: IBM     Published Date: Aug 06, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data. If retailers succeed in addressing the challenges of “big data,” they can use this data to generate valuable insights for personalizing marketing and improving the effectiveness of marketing campaigns, optimizing assortment and merchandising decisions, and removing inefficiencies in distribution and operations.
Tags : ibm, retail, data, big data, power, stores, interact, social media
     IBM
By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
     EMC Corporation
By: Egencia     Published Date: Aug 04, 2014
Over the past decade, procurement fundamentals have redefined travel management. As the industry refreshes its position on traveler satisfaction, however, travel management and procurement concepts find a new balance in best-in-class programs.
Tags : egencia, modern travel management, business travel, managing expenses, travel dollars, travel policy, enterprise applications
     Egencia
By: Windstream     Published Date: Aug 04, 2014
Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!
Tags : windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits, it management, data management
     Windstream
By: CA Technologies     Published Date: Aug 01, 2014
This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
     Skillsoft
By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
     Entrust Datacard
By: Localytics     Published Date: Jul 18, 2014
Whether your business model is driven by in-app advertising, purchases, or paid subscriptions, driving your revenue is fundamentally dependent on personalization and engagement. The metrics are available, but identifying which are the most important for tracking engagement and are the most actionable can be tricky.
Tags : app metrics, app measurement, app users, app screenflow, track users, user segmentation, segment user, user retention, retain user, user acquisition, acquire user, lifetime value, user value, engage user, user engagement, session length, session interval, time in app, measure app user, app user metrics
     Localytics
By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
     Symantec Corporation
By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas, recovery point objectives, rpo, recovery time objectices, rto, virtualized server recovery, it management
     IBM
By: Epicor     Published Date: Jun 30, 2014
Manufacturers that address the fundamental requirements know that “Top-to-Shop” isn’t an urban legend anymore. Those that have eliminated the disconnect between the shop floor and the top floor have succeeded in enhancing the extended supply chain. More importantly, their executive leadership consistently achieves business goals—with the help of those on the line and in plant, operations and management.
Tags : epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing, enterprise applications
     Epicor
By: BMC Software     Published Date: Jun 13, 2014
The last five years have fundamentally changed the way people interact with technology, leaving IT in a reactive mode. As business customers have rushed to “consumerized” services and experiences, IT is beginning to redefine its approach to offering IT services.  In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience.
Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions, it management, data center
     BMC Software
By: Box     Published Date: Jun 11, 2014
The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. It’s not just about being able to work anywhere and anytime, it’s about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies, it management
     Box
By: IBM     Published Date: Jun 05, 2014
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : ibm
     IBM
By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data, applications, business critical applications, integrations, it management, data management, data center
     IBM
By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
     McAfee
By: SAP     Published Date: May 18, 2014
Leading companies and technology providers are rethinking the fundamental model of analytics, and the contours of a new paradigm are emerging. The new generation of analytics goes beyond Big Data (information that is too large and complex to manipulate without robust software), and the traditional narrow approach of analytics which was restricted to analysing customer and financial data collected from their interactions on social media. Today companies are embracing the social revolution, using real-time technologies to unlock deep insights about customers and others and enable better-informed decisions and richer collaboration in real-time.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
     SAP
By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
     Entrust Datacard
By: McAfee     Published Date: May 07, 2014
An in depth look at stealth crimeware, the damage it can cause and how you can protect against it.
Tags : stealth crimeware, mcafee, malware, spyware, protection
     McAfee
By: IBM     Published Date: May 02, 2014
This eBookoutlines the best practices for data lifecycle management and how InfoSphere Optimsolutions enable organizations to support and implement them.
Tags : ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management, big data strategy, it management
     IBM
By: IBM     Published Date: Apr 29, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data.
Tags : ibm, retail, ecommerce, big data, retail technology, social media, data analytics, customer insights, customer analytics, personalization, ecommerce
     IBM
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com