2012

Results 101 - 125 of 251Sort Results By: Published Date | Title | Company Name
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security
    
Symantec.cloud
Published By: Dell     Published Date: May 04, 2015
Read this white paper to see how end-to-end solutions from Dell combine Microsoft Windows Server® 2012 “Cloud Operating System” and a new generation of Microsoft business applications on flexible, scalable, power-efficient, virtualization-ready infrastructure
Tags : 
    
Dell
Published By: F5     Published Date: Feb 07, 2013
In this report, Gartner evaluates vendors’ strengths and weaknesses, and places vendors on the Magic Quadrant based on ability to execute and completeness of vision for application delivery controllers.
Tags : 
gartner magic quadrant, application delivery controllers, gartner survey, gartner review, controllers
    
F5
Published By: Symantec     Published Date: Dec 19, 2012
We recommend this analyst report for anyone considering an investment in an archive solution.
Tags : 
information archiving, enterprise, magic quadrant, e-discovery, compliance, storage
    
Symantec
Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
Download this Gartner Analyst report to learn why HP is positioned as a leader in Wired and Wireless LAN Access Infrastructure.
Tags : 
wlan, lan, gartner, wireless access, wireless lan
    
HP OMG Mobile Workforce
Published By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : 
gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
    
ForeScout
Published By: Adobe     Published Date: Oct 19, 2012
Three trends have altered the Web content management market since 2011: social media, mobile computing and WCM used in more comprehensive solutions toward online channel optimization. Read on to learn more about WCM and the best in class solutions.
Tags : 
wcm, adobe, web content management, java, .net, social media, customer experience, online channel
    
Adobe
Published By: Adobe     Published Date: Nov 06, 2012
Read this latest Gartner report to learn key trends in the Web Content Management (WCM) market for 2012, Adobe's core strengths in the WCM space and Why Gartner rates Adobe as a market leader in web content management.
Tags : 
adobe, gartner, web content management, wcm, digital marketing strategy
    
Adobe
Published By: Bronto     Published Date: Nov 07, 2011
As channels for communicating digitally with customers evolve and increase, email's role is changing. Explore current trends in e-commerce, the influences of social content and the mobile experience, as well as provide ideas you can deploy now to distinguish yourself in the inbox.
Tags : 
bronto, marketing, email marketing, customer engagement, strategies
    
Bronto
Published By: Bronto     Published Date: Mar 16, 2012
As an online retailer, you're always testing new e-marketing strategies to see which work for you and which do not. We're delighted to be able to offer you five that may be new to you - and that we think will work exceptionally well to increase your sales. Our white paper, "Get your revenue off the shelves in 2012: 5 Strategies to Deploy Now," goes into detail on all five.
Tags : 
marketing, email marketing, web analytics, marketing strategy, marketing
    
Bronto
Published By: Kenshoo     Published Date: Oct 30, 2012
Kenshoo Global Search Advertising Trends is the first in a new series of reports reflecting aggregate campaign data across search engines like Google, Yahoo!, Bing, and Baidu. Read on to learn about paid search trends by search engines and more.
Tags : 
kenshoo, global search trends, search engines, search, enterprise search
    
Kenshoo
Published By: Act-On     Published Date: Mar 20, 2013
A 2012 survey of consumer channel habits and preferences found 77% preferred to receive permission-based promotions via email; only 6% preferred such messages via social media. Read on to figure out how Email remains the most potent marketing tool.
Tags : 
marketing list, email, grow your email marketing list, roi, return on investment, dma, marketing tools
    
Act-On
Published By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates
    
Entrust Datacard
Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the highest converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing
    
CPC Strategy
Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
    
Proofpoint
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP     Published Date: Nov 05, 2014
Microsoft® will end support for Windows® Server 2003/R2 on July 14, 2015. This can have a dramatic impact on your business, because without any more updates or patches from Microsoft, your organization’s infrastructure will be less stable and secure. HP can help you to make a smooth migration to Microsoft Windows Server 2012 and to private cloud solutions built on HP Converged Infrastructure and Microsoft System Center, HP has created a Microsoft Virtualization and Cloud Center of Excellence.
Tags : 
technology services, microsoft windows, microsoft migrations, stabilize infrastructure, secure infrastructure, compliance, detection systems, migrations
    
HP
Published By: IBM     Published Date: Jun 25, 2013
This new edition has a wider scope than the previous one, with 17 participants while retaining a similar maturity model as the previous one in order to help participants measure their progress year -on-year.
Tags : 
hpc, maturity, risk management, maturity model
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking
    
IBM
Published By: IBM     Published Date: Oct 24, 2012
This state of marketing survey for 2012 details marketers' biggest challenges and opportunities reveal the rise of the empowered customer.
Tags : 
ibm, marketing, data analytics, it partnership, customer experience, customer relationship
    
IBM
Published By: CDW     Published Date: Aug 07, 2013
In the spring of 2012, IBM® introduced its PureSystems family of intelligent, integrated, powerful and flexible computing systems. At that time, IBM committed to a continuing process of improvement and additions to these systems as technology and innovation evolved.
Tags : 
cdw, ibm, pureflex, datacenter, datacenter management, puresystems
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library