execute

Results 226 - 250 of 284Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Aug 09, 2013
Symantec Endpoint Protection 12 positioned as a Leader in 2013 Gartner’s Magic Quadrant Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartner’s Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Aug 12, 2013
Symantec has been positioned as a Leader in Gartner Magic Quadrant for Secure Email Gateways. Gartner is the world's leading information technology research and advisory company. Vendors in the Magic Quadrant are evaluated based on ability to execute and completeness of vision. Read Gartner's Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Sailthru     Published Date: Jul 01, 2015
While 70% of consumers prefer getting to know a company via content over ads, most brands are challenged with navigating content marketing and management. Making the transition from pushing product to nurturing consumers is not easy, but a smartly-executed content approach can increase purchase conversion, purchase frequency and brand loyalty.
Tags : 
content, commerce, retail, ecommerce, publishing, media, customer experience, marketing
    
Sailthru
Published By: Ring Central     Published Date: Mar 21, 2016
Gartner Inc., the world’s leading information technology research and advisory firm, has positioned RingCentral in the Leaders Quadrant of the 2015 report, Magic Quadrant for Unified Communications as a Service (UCaaS), Worldwide,* as a result of its ability to execute and the completeness of vision.
Tags : 
ring central, gartner, unified communications, cloud, phone systems
    
Ring Central
Published By: DocuSign     Published Date: Aug 17, 2016
Procurement teams are moving away from traditional paper-based processes and adopting new technologies to save time, resources and money. Download this complimentary whitepaper to learn how DocuSign is making it easier for Procurement teams to go mobile, manage business relationships, and execute approval cycles faster.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: DocuSign     Published Date: Aug 17, 2016
As the saying goes “a chain is only as strong as its weakest link.” When business processes lack the ability to execute the contract or form with the same speed and control, the value of the whole chain is reduced. This departmental brief explores how electronic approval and signature technology helps create a hyper-efficient contract infrastructure by removing the risk of paper-based processes.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Procurement teams are moving away from traditional paper-based processes and adopting new technologies to save time, resources and money. Download this complimentary whitepaper to learn how DocuSign is making it easier for Procurement teams to go mobile, manage business relationships, and execute approval cycles faster.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
As the saying goes “a chain is only as strong as its weakest link.” When business processes lack the ability to execute the contract or form with the same speed and control, the value of the whole chain is reduced. This departmental brief explores how electronic approval and signature technology helps create a hyper-efficient contract infrastructure by removing the risk of paper-based processes.
Tags : 
    
DocuSign
Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Marketo     Published Date: Feb 07, 2017
Marketers are making leaps and bounds in their marketing maturity—from how they think about strategy to how they execute campaigns—and they are using technology to make it possible. This report, based on the responses from over 1,300 marketers, covers how marketers are practicing marketing today and highlights a few opportunities for them to act upon. Download the report to get the full results of our survey, including how marketers: Structure their global automation strategy Plan their MarTech stack strategy Use and scale their marketing channels Measure their impact
Tags : 
martech, marketing, global automation, marketing benchmark
    
Marketo
Published By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the Gartner Magic Quadrant for Digital Marketing Hubs, and find out why Marketo was named a leader based on completeness of vision and the ability to execute. As a digital marketing hub, Marketo allows marketers to think beyond email campaigns and address customers personally and consistently as individuals through a variety of contexts and formats. Digital marketing hubs, like Marketo, unify disparate marketing data and processes to drive acquisition, engagement, conversion and transaction across complex customer journeys. The full report includes: Market evaluation and analysis of 22 vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying digital marketing hubs Download the report to learn about these topics and more.
Tags : 
digital marketing hub, email campaigns, customers, disparate marketing data, vendor selection, gartner
    
Marketo
Published By: Cisco     Published Date: May 11, 2015
Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste.
Tags : 
recruiting, management, talent, connectivity. culture
    
Cisco
Published By: AlienVault     Published Date: Jul 22, 2016
Common browser vulnerabilities used to execute these attacks What attackers do next to take control of the system How to catch it before the attacker moves further into your network
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: Act-On     Published Date: Jan 08, 2015
New customer acquisition is the lifeblood of many businesses, but it can be costly. Comprehensive lead management strategies have been developed to maximize lead value and bring order and efficiency to the top of the marketing funnel. Such strategies emphasize quality, precision, and the increased probability of conversion. When well-executed, lead management strategies can produce significant savings, reduce time spent in the funnel, and bring sales and marketing into closer concert.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy
    
Act-On
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
BrightWave Marketing designed and executed a remarketing email campaign to help CoreNet Global, the world’s leading professional association for corporate real estate and workplace executives, promote its Annual Summit. Read this case study to find out about the changes made and their results.
Tags : 
brightwave, email marketing, event marketing, conference, conferences, registrations, register, registration
    
BrightWave Marketing
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food
    
IBM
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
    
Aomega
Published By: Bronto     Published Date: Jan 03, 2013
While most marketers would agree that the more data we have, the better; it's important we focus on collecting the "right" data and using it sensibly to execute effective email, mobile, and social marketing campaigns.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: Marketo     Published Date: Jun 26, 2015
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on completeness of vision and the ability to execute.
Tags : 
    
Marketo
Published By: Network Automation     Published Date: Dec 08, 2008
Often, the insurance underwriters stay late that last day of the month to enter new policies. This means that IT staff have a very small window to execute the applications critical to successful and error-free closing of the accounting books. IT staff had to run and baby sit the applications – one application requiring manual operation took over three hours to complete, another that uploads premium and claim information to the data warehouse took up to six hours.
Tags : 
network automation, application execution, process automation
    
Network Automation
Published By: Aprimo, Inc.     Published Date: Dec 19, 2008
Marketing is a dynamic and fluid business that must anticipate and quickly react to changes in the market. The marketer today must manage increased competitive pressure along with economic fluctuations, industry trends and changes in customer behavior. The combination of rapid changes in the market place with increased competition necessitates a more agile marketer that reacts quickly to changes and can execute programs in less time than their competitors.
Tags : 
aprimo, marketing challenges, soa, micro marketing, campaign management
    
Aprimo, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library