2012

Results 151 - 175 of 251Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: Interactive Intelligence     Published Date: Jan 12, 2012
Join us for this web event where featured Forrester Research principal analyst, Art Schoeller and Interactive Intelligence senior vice president, Joe Staples will discuss these topics and help you be ready to take the best advantage of the upcoming year and the contribution your contact center can make to the success of your business.
Tags : 
interactive, marketing, trends, marketing analytics, interactive marketing
    
Interactive Intelligence
Published By: Kenshoo     Published Date: Oct 30, 2012
Tune in as we compare performance of different countries based on various Facebook advertising metrics. Learn more about social media advertising in 2012 by country by downloading this white paper.
Tags : 
kenshoo, facebook, advertising, advertising ads, facebook advertising, global games
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
Kenshoo Global Search Advertising Trends is the first in a new series of reports reflecting aggregate campaign data across search engines like Google, Yahoo!, Bing, and Baidu. Read on to learn about paid search trends by search engines and more.
Tags : 
kenshoo, global search trends, search engines, search, enterprise search
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
In the Kenshoo 2012 best practices tip sheet for the US, we explore the numbers for the holiday season including advertising, search engine advertising, impressions, clicks and much more.
Tags : 
best practices, kenshoo, holiday season, search engine advertising, impressions, clicks, holiday season
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 7 key insights from year-over-year data on the 2011 US holiday season. Read on to learn more about key metrics in the holiday season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, search advertising, clicks, impressions, search advertising, marketing metrics
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 5 key insights from year-over-year data with some perspective on the 2011 UK Christmas season. Read on to learn more about key metrics in the season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, 2012 uk christmas, online retail, e-commerce, shopping, search marketing, advertising, online advertising
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
Christmas shopping on the Internet has come of age. In fact, 2011 was its debutante year. Last year, consumers embraced e-commerce with enthusiasm, and retailers reaped the rewards. Here's our recap of 2011 along with some predictions for 2012.
Tags : 
kenshoo, 2012 e-commerce, best practices, search marketing, clicks, impressions, search advertising
    
Kenshoo
Published By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
    
Symantec
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : 
ponemon, tco, software, hardware, full disk, encryption, total, cost
    
WinMagic Inc.
Published By: SAS     Published Date: Jul 02, 2012
Insights from a webinar in the 2012 SMB Quarterly Webinar Series
Tags : 
truecar, sas, research
    
SAS
Published By: Webroot     Published Date: Oct 27, 2012
An Overview by George Anderson- Product Marketing Manager May 2012
Tags : 
it security, endpoint security, anti-virus protection, malware protection, malware detection
    
Webroot
Published By: AMD FirePro     Published Date: Apr 18, 2012
A comprehensive overview of the AMD FirePro and Solidworks relationship, highlighting the key selling points, benchmarks, case studies, customer references, and much more.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation
    
AMD FirePro
Published By: Tse & Tse Consulting     Published Date: Jun 14, 2012
This paper collects my opinions about some hot topics in identity access management communities in mid 2012.
Tags : 
tse and tse consulting -security, identity access management, identity access management toronto, solution architect, consulting
    
Tse & Tse Consulting
Published By: Bridgeline Digital     Published Date: May 17, 2013
Digital touchpoints support an increasingly large percentage of the overall customer experience. 2012 saw the emergence of several important digital customer experience trends that will gain momentum as firms look to unify the cross-touchpoint experiences they deliver in 2013. This report outlines key trends that will make up the landscape that customer experience professionals will be working in as they take strides to improve their digital customer experiences in 2013.
Tags : 
forrester, digital customer experience, customer experience management, customer experience trends, digital experiences
    
Bridgeline Digital
Published By: IBM     Published Date: Jun 25, 2013
This new edition has a wider scope than the previous one, with 17 participants while retaining a similar maturity model as the previous one in order to help participants measure their progress year -on-year.
Tags : 
hpc, maturity, risk management, maturity model
    
IBM
Published By: Oracle     Published Date: Feb 14, 2013
In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
top talent management, best practices, 2012, talent driving results, leveraging talent, hr technology, oracle
    
Oracle
Published By: IBM     Published Date: Aug 05, 2014
The MDM of customer data solutions market segment grew healthily in 2012. New acquisitions and integrations of prior acquisitions by the Leaders have continued, and several visions for linking MDM and social data have emerged. This Magic Quadrant will help you find the right vendor for your needs.
Tags : 
ibm, magic quadrant, master data, data, management, solutions, mdm, vendor
    
IBM
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
In September 2012, the New York City Board of Health approved a measure to ban the sale of large sodas and other sugary drinks in restaurants, movie theaters, sports arenas and street carts in a first of its kind restriction in the US. At the forefront of this measure was Mayor Michael Bloomberg. The mayor noted that 6,000 New Yorkers die every year from obesity-related illness. Some ethnic groups in the city have rates of overweight and obesity approaching 70 percent of adults. African-American New Yorkers are three times as likely, and Hispanic New Yorkers twice as likely, as white New Yorkers to die from diabetes.1 Is this social policy run amuck? Is it, as some have suggested, an infringement on individual rights? Or is it simply recognition that health issues cannot be treated in isolation from the many other factors that affect an individual’s or a community’s health?
Tags : 
    
Group M_IBM Q119
Published By: Cisco     Published Date: Jul 11, 2016
As Microsoft Windows Server 2003 nears its end-of-support date in July 2015, businesses still running the aging OS are facing a number of vital considerations. The computing landscape has changed drastically since the release of Windows Server 2003 more than a decade ago. Although the Windows Server 2003 platform worked well in its time, after Microsoft support expires, it will become both a liability and a limitation for organizations still running it. In this document, you’ll learn some of the important reasons why your company needs to migrate important workloads and services away from Windows Server 2003. You’ll learn about some of the biggest concerns about Windows Server 2003’s end of life, as well as some essential considerations to keep in mind while planning your migration.
Tags : 
    
Cisco
Published By: LeapFrog Interactive     Published Date: Jul 02, 2008
It has been projected that interactive marketing spending will hit the $61 billion mark by 2012. With this much competition, a brand needs to make sure the dollars it invests in interactive marketing are well spent or risk being lost in the growing ad clutter. To help ensure its ad money won’t be wasted, a brand needs a blueprint to follow in order to guide it to interactive marketing success.
Tags : 
interactive, marketing strategy, leapfrog, leap frog, interactive agency, marketing plan, branding
    
LeapFrog Interactive
Published By: IBM     Published Date: Apr 26, 2013
In the spring of 2012, IBM launched a comprehensive re-thinking and refresh of its IT Service Management (ITSM) offerings. The IT management products formerly known as Tivoli Service Request Manager, IT Asset Management and Change Configuration Management Database have now been combined into a single product, IBM SmartCloud Control Desk 7.5. The products span advanced support for IT and intelligent asset management, change and configuration management, service request management and service catalog, along with Cloud delivery options and built-in support for automation beyond traditional service desk workflow.
Tags : 
smartcloud, control, desk, consolidate, advances, services, management
    
IBM
Published By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : 
control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library