2012

Results 126 - 150 of 251Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security, spam, osterman research, proofpoint, whitepaper, white paper, email archiving, email security, cloud, report
    
Proofpoint
Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink
Published By: Dell     Published Date: Sep 24, 2012
Get the benefits of rigorous server, storage and software integration testing with DellT Desktop Virtualization Solutions (DVS) reference architectures.
Tags : 
windows, dell, architecture, virtual desktop environment, network architecture, hardware, storage architecture, server infrastructure
    
Dell
Published By: Dell     Published Date: Sep 24, 2012
Dell PowerEdge 12th Generation Servers Enable Customers to Maximize Benefits of Microsoft Windows. Dell vStart and reference architectures provide streamlined deployment and enable customers to maximize the comprehensive Windows Server.
Tags : 
dell, microsoft, virtualization, servers, networking, network setup, deployment, data, virtual desktop infrastructure
    
Dell
Published By: IBM     Published Date: Oct 24, 2012
This state of marketing survey for 2012 details marketers' biggest challenges and opportunities reveal the rise of the empowered customer.
Tags : 
ibm, marketing, data analytics, it partnership, customer experience, customer relationship
    
IBM
Published By: IBM     Published Date: Nov 08, 2012
In this white paper, Forrester discusses the 70 criteria evaluation of customer analytics vendors and discuss 6 of the most significant software providers, one including IBM, and scored them. Read on to learn how each vendor fulfills each key point.
Tags : 
forrester, ibm, customer analytics solution, data management, analytics production, analytics consumption
    
IBM
Published By: IBM     Published Date: Jan 09, 2013
This report details our findings about how well each vendor of cloud strategies - Like Box and Cisco Systems, fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other.
Tags : 
ibm, cloud, analysis, report, comparison, specifications, cloud strategy
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : 
sap, best practices, business intelligence, analytics strategy, technology
    
SAP
Published By: Cisco     Published Date: Nov 08, 2012
Forrester Consulting delivers a 2012 summary of trends and survey results from organizations with 100-1500 employees.
Tags : 
byod, bring your own device, cisco, mobility, workplace mobility, byod deployment
    
Cisco
Published By: CDW     Published Date: Apr 22, 2015
To get a handle on what was possible, and all that would be involved, Bob Stirton, director of information technology for the Kansas City Chiefs football organization, sent Network Engineer Scott Fletcher on a scouting mission to the 2012 Super Bowl at Lucas Oil Stadium in Indianapolis. Fletcher watched first-hand the inner workings of a recently installed Cisco Systems wireless network in full-on, gameday action.
Tags : 
wifi, wireless, technology, network
    
CDW
Published By: IBM     Published Date: May 22, 2013
Enterprise Management Associates (EMA) has conducted extensive research investigating the integration and management challenges created by the convergence of on-premise and public Cloud hosted applications. Research conducted in mid-2012 uncovered some compelling statistics about the role of Cloud integration in today's companies: Nearly 50% of the companies surveyed have already deployed tiered transactions spanning public Cloud and on-premise computing environments (one form of "hybrid Cloud") Approximately 35% have integrated (or are in the process of integrating) multiple Software as a Service (SaaS) applications. As one IT professional put it, "Everything is connected to everything." Because of this fact, any discussionof public Cloud as a standalone technology is outmoded. Few modern on-premise applications exist as"silos," and the same is true of Cloud-delivered applications.
Tags : 
ibm, cloud, cloud computing, integration, cast iron, ema, hosted, cloud hosting
    
IBM
Published By: Polycom     Published Date: Apr 30, 2013
In December 2012, Wainhouse Research (WR) and Polycom jointly created and fielded a WR-branded survey focused on the benefits that organizations realize via the use of video conferencing. Invitations to participate in the survey were released in numerous ways including: - Via email invites to a list of Polycom end-user contacts - Via email invites to a list of WR end-user contacts - Via clickable banners on numerous websites This document provides a top-level view of the survey data, along with some additional findings and observations.
Tags : 
video conferencing, telepresence, end-user, video conferencing, video collaboration
    
Polycom
Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
The basis for Legal Hold and Data Preservation Best Practices was the exceptional work by the group of presenters at the 2012 Conference on Preservation Excellence, held in Portland, Oregon in late September. The conference focused solely on the area of data preservation best practices. Download this White Paper for more information.
Tags : 
legal, preservation, legal hold, data, technology, best practices
    
CompareBusinessProducts.com
Published By: LogicNow     Published Date: Mar 10, 2016
If you’re an MSP, you’ll likely already have endured significant grief migrating your customer’s business applications to Windows Server 2008 and Windows Server 2012. And while you won’t need us to tell you that solving the Windows Server 2003 ‘end-of-life’ problem is no easy task – maybe we can make it easier.
Tags : 
windows server 2003, logicnow, servers, migration
    
LogicNow
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Oct 11, 2012
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands per second.
Tags : 
symantec, internet security, malware, identity theft, data security
    
Symantec.cloud
Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime, hacking breaches, security, application security, web application security, risk management, robustness, scanning, cloud platform
    
Qualys
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Epsilon     Published Date: May 30, 2012
For the sixth iteration, Email Institute has jazzed up our well-loved Look Book. This year, we've included a People's Choice email that you - our loyal readers - selected as your favorite email. After receiving hundreds of votes, we're unveiling our voter's pick and 26 other innovative emails.
Tags : 
marketing, epsilon, email, email marketing, digital marketing, online
    
Epsilon
Published By: Epsilon     Published Date: Jun 22, 2012
Epsilon and the Direct Marketing Association's Email Experience Council released the Q1 2012 North America Email Trends and Benchmarks which show a steady increase in open rates over both Q4 2011 and Q1 2011.
Tags : 
epsilon, marketing, email marketing, marketing trends, email trends
    
Epsilon
Published By: Bronto     Published Date: Sep 09, 2013
Bronto Software and Retail Systems Research have just published survey findings of 179 retailers regarding their holiday 2012 online marketing plans. Download the report to discover the quantitative findings.
Tags : 
online marketing, holiday marketing, mobile marketing, social marketing
    
Bronto
Published By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : 
aerohive, wlan, lan, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services, business continuity, teleworker, remote office, call center, virtual office, disaster recovery, zero touch wireless, retail pci
    
Aerohive
Published By: Aerohive     Published Date: Oct 01, 2012
2012-2013 Branch Router Buyer's Guide The definitive guide for evaluating branch networks
Tags : 
aerohive, branch networks, lan, byo
    
Aerohive
Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In March 2012, HP Storage commissioned a study to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying HP 3PAR Storage.
Tags : 
roi, storage, study
    
HP and Intel® Xeon® processors
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library