awareness

Results 51 - 75 of 227Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q3'19
Published By: Facebook     Published Date: Mar 07, 2012
Want practical tips on how to get started and drive value using Facebook? Consider your business connections. Using Facebook you can create awareness and build essential connections. Download the official best practice guide for your page and media strategy on Facebook.
Tags : 
facebook, social media, marketing, emerging marketing, social media marketing, business tools
    
Facebook
Published By: The Starr Conspiracy     Published Date: Jun 29, 2017
In this report, discover what’s important to learning buyers and what has changed with them since 2014.
Tags : 
sales engagement, active evaluation, brand and need awareness, sales leveraging, trade show, active evaluation
    
The Starr Conspiracy
Published By: The Starr Conspiracy     Published Date: Sep 19, 2017
It doesn’t matter if your goals involve brand awareness, functional association, or demand generation. Brands that fail to integrate an earned media strategy with paid and owned media strategies are missing key opportunities to influence the buyer’s journey. If you ignore earned media channels, you do so at the risk of missing that ideal customer. In this white paper, we’ll outline the top three reasons you need an integrated approach — that includes PR — to achieve great brand awareness
Tags : 
    
The Starr Conspiracy
Published By: Knightsbridge     Published Date: Sep 09, 2014
Organizational models today are shifting from hierarchical to flat. Careers are no longer an upward trajectory, but more likely to be a series of experiences, projects and development opportunities. But, a lack of awareness around the new flat organization dynamics is resulting in a perceived lack of opportunities for career movement within companies, and frustration among employees and leaders.
Tags : 
knightsbridge, career management, career development, talent development, employee engagement, manager relationship, human resources
    
Knightsbridge
Published By: Excellus BlueCross BlueShield     Published Date: Oct 17, 2018
When it comes to protecting yourself against breast cancer, knowledge is power. This toolkit covers everything from warning signs and the importance of early detection to what you can expect during a mammogram.
Tags : 
breast cancer, breast cancer awareness, healthcare, health benefits, health, health plans, excellus bcbs, excellus, employee benefits, health insurance, mammograms, cancer screenings, early detection, women’s health, self-examination
    
Excellus BlueCross BlueShield
Published By: ePharma     Published Date: Jan 08, 2018
Digital Health solutions are still mostly driven by marketing departments, whether they be novel devices that alter the way we treat rare diseases or commonplace wearable bands that track our activity....With added information and innovative ways to improve health and access to care, marketing can now truly utilize innovative strategies to touch all the key players in the health ecosystem. There are three key areas to explore: 1. Consumer Awareness 2. B2B Becoming B2C 3. Legal Aspects
Tags : 
    
ePharma
Published By: HireVue     Published Date: May 18, 2018
Recruiting leaders know that if their companies aren’t sourcing and hiring for diversity they are missing valuable talent and experience. This is one of the reasons diversity has been a focus area for improvement in recent years. Many organizations start with training. While diversity training is important for creating awareness, it doesn’t a¬ffect human behavior. A 2017 meta-analysis of studies investigating bias training confirmed this. Formal training can reduce unconscious bias, but it does not change behavior.13 This has put talent leaders in a di cult position. The way to make real progress on diversity hiring initiatives is by using systematic processes that apply data-driven decision making. With structured interviews and AI, you can overcome unconscious bias and make hiring more equitable for all candidates.
Tags : 
    
HireVue
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness
    
McAfee
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access from anywhere, at any time, on any device. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical to making mission-critical applications highly available, fast and secure.
Tags : 
network, load balancing, application awareness, resource, context-aware application delivery
    
F5 Networks Inc
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
In the world of social sponsorships today the key to success is not just awareness but recognition. The path to recognition – which drives important outcomes like brand recall, consideration, and ultimately sales – requires new thinking and strategies in how to create inventive, relevant consumer experiences. Download now to learn the 5 ways to get your social brand noticed!
Tags : 
spredfast, social, social brand, sponsorship, recognition, consideration, consumer experience
    
Spredfast, Inc.
Published By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
    
Mimecast
Published By: Monotype     Published Date: Mar 28, 2017
Your brand may have throngs of fans and followers — people who “Like” or “Follow” a particular page or account. While these metrics are certainly important, they don't always equate to obvious value for your brand. The followers who are so passionate that they're creating branded content and advocating for you are the ones to focus on. Advocates are one of the best, most cost effective ways to drive business, hands down. Advocates are users with a true connection, passion and commitment to a particular brand or product. Advocates drive action, not just awareness, and unlike paid advertisers, they advocate because they want to. The second a customer becomes so invested in your brand that they share the love with their networks, they become your best marketer.
Tags : 
swyft, branding, brand advocates, consumer, purchase intent, content, media
    
Monotype
Published By: HP Inc.     Published Date: Jun 03, 2019
Awareness of the issue is essential. As with most security threats, an understanding of how it operates will help determine next steps. Here we have outlined seven key actions to help prevent cryptojackers taking over your network.
Tags : 
    
HP Inc.
Published By: Gemini Data     Published Date: Jan 16, 2018
The Gemini enterprise platform is designed from the groud up to help you extract the most from your data ultimately delivering true situation awareness to your organization
Tags : 
    
Gemini Data
Published By: InMoment     Published Date: Oct 14, 2019
In today’s experience economy, a simple request for feedback on a receipt is not enough to accurately determine your guests’ needs. Guests need to be presented with the option to share feedback at the right time for them—whenever, wherever, and however they want to. At the same time, the volume of feedback requests and the length of surveys often result in survey fatigue and other negative emotions in guests. This is just one of the complex issues restaurant brands find themselves facing today. Others include: • How do I understand the experience every individual guest has with my brand? • How do I communicate with them in a way that they’re more likely to give feedback? • How can I demonstrate awareness of the guests’ situations and acknowledge their needs?
Tags : 
    
InMoment
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy
Published By: Silverpop     Published Date: Jun 15, 2012
Racking up more "likes" is a good thing-but only if you tie them to strategic goals such as increasing sales, brand awareness and overall revenue. Learn tactics you can use to turn Facebook "likes" into customers.
Tags : 
marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns
    
Silverpop
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: Jive Software     Published Date: Mar 03, 2010
Learn how an industry-leading provider of storage and data management solutions used Social Business Software to accelerate a global branding initiative and connect with thousands of community members across one hundred countries.
Tags : 
jive, netapp community, social business software, storage, data management, hosting, online community, brand awareness, web experience, deployment
    
Jive Software
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats
    
Skillsoft
Published By: McAfee     Published Date: Apr 16, 2014
This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Tags : 
siem, log management, federal agency, compliance, situational awareness, visualization
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library