partner

Results 176 - 200 of 1367Sort Results By: Published Date | Title | Company Name
Published By: Brightcove     Published Date: Feb 04, 2015
Welcome to Content Marketing in Australia 2015: Benchmarks, Budgets, and Trends. This is the third year that Content Marketing Institute and the Association for Datadriven Marketing and Advertising (ADMA) have partnered to produce this report. This year, we look at how Australian for-profit marketers (both business-to-business and business-to-consumer) approach content marketing as compared with last year. Download the whitepaper to learn more!
Tags : 
australia, marketing, brightcove, benchmarks, budgets, trends, datadriven marketing and advertising, adma, for-profit marketers, content marketing institute
    
Brightcove
Published By: Bronto     Published Date: Jan 04, 2012
Seamless integration of partner solutions allows totes»ISOTONER to convert more customers, increase basket size and strengthen loyalty.
Tags : 
bronto, marketlive, marketing, online marketing, cross-channel marketing, personalization
    
Bronto
Published By: Bronto     Published Date: Jan 03, 2013
Email marketing has been the workhorse of online marketing for a while, but finding the right long-term partner continues to elude many retailers.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: Bronto     Published Date: Jan 20, 2017
Bronto partnered with Ipsos Research and Censuswide to survey more than 4000 US, UK and Australian shoppers about their preferences for cross-border shopping, factors that entice them to shop outside their home country, and remaining barriers to global ecommerce. In this paper we found: - Australian consumers (71%) embrace cross-country commerce more than the UK (44%) and the US (42%). - Women and shoppers over 55 years old are more likely to choose merchants in their home country. - The two top reasons for buying from another country are unique merchandise at a better price. - Barriers include concern about shipping costs, distrust of online payments and security worries. - Download this research report to get more valuable insights and advice to help you be the winner in this growing global competition.
Tags : 
bronto, e-commerce, global sales, customer lifecycle
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
With a growing number of marketing application available, marketing terms are struggling to see differences among them. Meanwhile, IT teams are bogged down with development and maintenance requests to migrate or manage the use of multiple platforms already in use. Choosing a marketing technology partner is a total-revenue-performance decision. Ask questions about integration and scalability. Find partners whose marketing automation is built to scale with your business, and select vendors whose teams provide the critical support and services you'll need along the way.
Tags : 
bronto, integration, e-commerce, marketing automation, platforms, internet retailers, business growth, revenue generation, buzzwords, solutions
    
Bronto
Published By: Bronto     Published Date: Jul 10, 2017
With a growing number of marketing applications available, marketing teams are struggling to see differences among them. Meanwhile, IT teams are bogged down with development and maintenance requests to migrate or manage the use of multiple platforms already in use. Gartner’s 2016-2017 CMO Spend Survey found that marketing departments are spending 38% of their tech budgets on external development services and cross-charges from internal IT teams. Strategic marketing and IT leaders are looking for ways to streamline technology and eliminate solutions that limit integrations and scalability. It’s important to look at the resources required to maintain the marketing applications you use and compare them to other options available in the marketplace. Choosing a marketing technology partner is a total-revenue-performance decision. Ask questions about integration and scalability. Find partners whose marketing automation is built to scale with your business, and select vendors whose teams pro
Tags : 
marketing automation, commerce, gartner, integration, scalability
    
Bronto
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 03, 2015
"To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application economy has forced businesses to transform. To capture new growth opportunities, enterprises are opening up and sharing select data and applications with developers, partners, mobile devices, the cloud and the Internet of Things (IoT). One of the byproducts of this transformation is the discovery that legacy data has value in the application economy—so much so that new revenue opportunities emerge as this data is used in new ways.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
In der digitalen Wirtschaft sind Anwendungsprogrammierschnittstellen (APIs) unerlässlich, um Ideen schnell umzusetzen und neue Geschäftschancen zu nutzen. Sie sind die Bausteine der digitalen Transformation und ermöglichen es Unternehmen, eine herausragende Customer Experience bereitzustellen, neue Umsatzquellen zu erschließen und Mitarbeiter, Partner, Anwendungen und Geräte jederzeit und überall mit Daten zu verbinden.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In dem Maße, in dem Unternehmen ihre On-Premise-Daten und -Anwendungsfunktionen für Partnerunternehmen, das Internet, mobile Anwendungen, intelligente Geräte und die Cloud zugänglich machen, verschwimmen branchenübergreifend die Grenzen des traditionellen Unternehmens. Die Grundlage dieses neuen, offenen Unternehmens sind APIs (Anwendungsprogrammierschnittstellen), denn damit können Unternehmen die vorhandenen Informationen unternehmensübergreifend für mehrere Zwecke auf einmal nutzen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Application Economy hat Unternehmen zu Umstellungen gezwungen. Unternehmen machen ausgewählte Daten und Anwendungen für Entwickler, Partner, Mobile Devices, die Cloud und das Internet of Things (IoT) zugänglich, um neue Wachstumschancen wahrzunehmen. Im Zuge dieser Umstellungen zeigte sich, dass Legacy-Daten in der Application Economy von Nutzen sein können, und zwar in einem solchen Ausmaß, dass sich durch die neue Art der Verwendung dieser Daten neue Umsatzchancen ergeben.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
The “connected car” market is forecasted to reach $98.42 billion by 20181. The convergence of the app economy, increased connectivity, the Internet of Things (IoT), growth of in-car screen displays and open enterprise data models is giving automotive manufacturers and their partners a wealth of opportunities to improve service delivery and backend supply-chain management.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data—anytime, anywhere.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library