water

Results 126 - 138 of 138Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 10, 2014
In this paper, IBM proposes that organizations relying on the traditional waterfall process for systems and software delivery-that is, an engineering governance model-need to make changes to reduce risk and improve results
Tags : 
ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed, it landscape, delivery software
    
IBM
Published By: Meltwater     Published Date: Oct 14, 2015
What can you do to make sure your content gets noticed? While many companies are spending an inordinate amount of time and money crafting and promoting content for prospects and customers, 60% to 70% of this B2B content goes unused. It’s time to explore the nuances of customer motivation and decision-making and find those moments when we can inspire and engage our customers. Download our e-book on mapping content to complex and unpredictable customer journeys, by Douglas Karr, founder of the Marketing Technology Blog.
Tags : 
meltware, content roi, b2b, customer motivation
    
Meltwater
Published By: Meltwater     Published Date: Apr 13, 2016
Chances are, you’ve already seen a lot of buzz around content marketing and its effectiveness as a marketing tactic. But what exactly is content marketing?
Tags : 
marketing, content marketing, best practices, business optimization, public relations, communications
    
Meltwater
Published By: Meltwater     Published Date: May 28, 2015
This report replaces an earlier report that was formerly the continuous improvement report for this playbook.
Tags : 
social data, social marketing, marketing maturity, marketing strategy, customer insights, marketing programs, technology brands
    
Meltwater
Published By: RES Software     Published Date: Jul 03, 2012
Waterbury Hospital implemented RES Workspace Manager to streamline workflow and improve overall clinician productivity. Working seamlessly with Citrix XenApp, RES Workspace Manager accelerated clinicians' access to their applications and eliminated old login scripts that caused significant delays for clinicians.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, desktop migration, networking solutions
    
RES Software
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
    
AlienVault
Published By: AlienVault     Published Date: Aug 14, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Common browser vulnerabilities used to execute these attacks What attackers do next to take control of the system How to catch it before the attacker moves further into your network
Tags : 
    
AlienVault
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Today, businesses pour Big Data into data lakes to help them answer the big questions: Which product to take to market? How to reduce fraud? How to retain more customers? People need to get these answers faster than ever before to reduce “time to answer” from months to minutes. The data is coming in fast and the answers must come just as fast. The answer is self-service data preparation and analytics tools, but with that comes an expectation that the right data is going to be there. Only by using a data catalog can you find the right data quickly to get the expected insight and business value. Download this white paper to learn more!
Tags : 
    
Waterline Data & Research Partners
Published By: Bronto     Published Date: Nov 07, 2011
To help you navigate the waters, here are eight signs that you may have outgrown your current Email Service Provider (ESP) and are ready to step up to a richer, more advanced email marketing platform.
Tags : 
bronto, marketing, email marketing, email service provider, esp, whitepaper
    
Bronto
Published By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Start   Previous    1 2 3 4 5 6     Next   End
Search Resource Library