awareness

Results 76 - 100 of 227Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : 
big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies, siem use cases, customer stories, federal government, healthcare provider, retailer, utility company, financial services
    
McAfee
Published By: CradlePoint     Published Date: Sep 04, 2014
Once considered experimental merchandising for adventurous retailers and cash-strapped entrepreneurs, pop-up stores have become an established national phenomenon and a legitimate means of testing product, generating buzz, building brand awareness, and driving sales for big-name retailers and ambitious upstarts alike. Growth in mobile broadband technology is expanding the possibilities for a diverse array of applications in mobile pop-up. Furthermore, the “fly-by-night” qualities that might have characterized early pop-ups have now been supplanted by dependable, secure infrastructure solutions that put temporary retail locations on par with their more permanent counterparts. Download the whitepaper to learn more!
Tags : 
pop-up stores, secure infrastructure solutions, mobile pop-up, cradlepoint
    
CradlePoint
Published By: Turn     Published Date: Mar 09, 2016
From awareness to consideration to intent to conversion, marketers can now track campaigns at an extremely detailed level. Learn how to align the right programmatic tactics and metrics for each stage of the customer journey.
Tags : 
programmatic, omnichannel, multichannel advertising, dsp, demand side platform, omnichannel campaigns, audience definition, campaign tactics, campaign strategy, awareness, conversion
    
Turn
Published By: Forcepoint     Published Date: Apr 19, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
    
Forcepoint
Published By: Cisco     Published Date: Jul 11, 2016
The Internet of Things (IoT) stands to benefit a number of key public sector subverticals, particularly public safety, because it will be leveraged to enhance real-time situational awareness, improve response times and safety, function as a force multiplier, help minimize operational expenditures, and facilitate evidence-based operations and real-time safety decisions.
Tags : 
    
Cisco
Published By: Plantronics     Published Date: Sep 27, 2013
We have all heard so much about the importance of social media, but it can be hard to know where to begin using these tools for your business. This guide cuts through the hype and shows you concrete uses of social media for your business.
Tags : 
social media, facebook, twitter, customer relationship management, youtube, linkedin, marketing, brand awareness
    
Plantronics
Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach
    
Javelin Strategy & Research
Published By: Marketo     Published Date: Feb 11, 2019
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team. ResizedImage389253 dog with laptop lead generation You’ll learn how to: Define a lead and understand his or her buying journey Build a robust lead generation strategy t
Tags : 
    
Marketo
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Establishing a thriving business takes dedication and hard work, yet that can easily be destroyed without taking precautionary measures. To create more safety awareness, we’ve listed the top five vulnerabilities business owners face every day.
Tags : 
robbery, burglary, theft, liability, fire safety, vandalism
    
Tyco Integrated Security
Published By: Wyng     Published Date: Jul 27, 2016
In May 2016, Offerpop commissioned Forrester Consulting to evaluate how marketers view the importance of UGC in building brand awareness and improving marketing and advertising campaigns. Forrester tested the hypothesis that marketers who inspire the creation and sharing of UGC and leverage it at each point of the customer life cycle see significant benefits.
Tags : 
offerpop, marketing, marketing success, user-generated content, content strategy, forrester, ugc, brand awareness
    
Wyng
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated
Tags : 
intel, deduplicated, storage, network
    
HP and Intel® Xeon® processor
Published By: IBM     Published Date: Apr 23, 2008
This Q&A-style article from CIO Green Edge Zone covers some of the many ways businesses can benefit through green technologies. Becoming more energy efficient not only dramatically reduces power costs, but can actually help companies improve operational efficiencies, increase productivity, enhance customer service and heighten brand awareness.
Tags : 
ibm, opt it, ibm opt it, green, environmental, environment, productivity
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As data center costs continue to rise, green is the word of the day. What it means is cost savings through consolidation and lower energy usage, as this white paper shows. See the role energy consumption plays in today's data centers, and how IBM Tivoli solutions can help optimize energy use in the data center.
Tags : 
ibm, u.s. environmental protection agency, green data centers, visualization and reporting, asset management and spatial awareness, optimizing power usage and cost, ibm tivoli, storage
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
IBM Lotus® Sametime® software is an award- winning platform for realtime collaboration. For years, organizations of all types have taken advantage of the Lotus Sametime platform’s powerful, security-enhanced features, such as integrated presence awareness, instant messaging (IM), Web conferencing, voice and video, to help people quickly find, reach and collaborate with each other.
Tags : 
security-enhanced features, instant messaging (im), web conferencing, voice and video, sharepoint
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Vendors in this market have been challenged in their attempts to gain market visibility and awareness for their products and for the benefits they can provide compared with just throwing more hardware at the problem.
Tags : 
ibm, database application, vendor, data archiving, erp, crm application, customer relationship management
    
IBM
Published By: BrightCove     Published Date: Nov 26, 2008
With the rapid growth of online video, more and more B2B marketers are using video to drive results and ROI throughout the customer lifecycle. Because video enables marketers to tell more engaging stories about their businesses, brands and products, video has quickly proven to be one of the most successful ways of acquiring, interacting with and converting new customers. With this white paper, you will see case studies from successful video marketers and discover 5 ways you can begin leveraging online video today .
Tags : 
brightcove, video imperative, branding & awareness, video advertising, online video platforms, google analytics
    
BrightCove
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
Tags : 
shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci, climate savers computing initiative, carbon footprint
    
Shavlik Technologies
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture
    
NetIQ
Published By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : 
advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware, sandbox technology, network protection, integrating security systems
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw
    
McAfee
Published By: Telligent June 2013     Published Date: Jun 13, 2013
Social Marketing encompasses a slew of activity that takes place in social networks and online communities. The mashup of all this activity is a way for your brand to build better customer relationships, increase awareness of your brand and ultimately drive sales.
Tags : 
social engagement, social marketing, community marketing, social media marketing, online customer experience, social media strategy
    
Telligent June 2013
Published By: Varonis     Published Date: Feb 05, 2014
Accelerate Data Protection with Context Awareness
Tags : 
varonis, data, data protection, context awareness, sensitive data, corporate network, data breach
    
Varonis
Published By: Intel Security     Published Date: Jan 20, 2015
With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw
    
Intel Security
Published By: Dell EMC     Published Date: Jul 27, 2015
IDC White Paper - Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
workload awareness, hybrid cloud strategies, it solutions, workload priorities, idc
    
Dell EMC
Published By: QuickPivot     Published Date: Jul 02, 2015
While it might feel crazy, complex and cobbled together, the marketing data and technology at your feet are pillars on which to build your brand. The modern marketer will not lurk in dark shadows, doomed to a life of misunderstanding, but will rise up and harness the tools at his fingertips to forever shift the brand/consumer relationship.
Tags : 
quickpivot, modern marketing, consumer relationships, brand awareness, marketing solutions, data analytics
    
QuickPivot
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library