awareness

Results 76 - 100 of 229Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 20, 2009
IBM Lotus® Sametime® software is an award- winning platform for realtime collaboration. For years, organizations of all types have taken advantage of the Lotus Sametime platform’s powerful, security-enhanced features, such as integrated presence awareness, instant messaging (IM), Web conferencing, voice and video, to help people quickly find, reach and collaborate with each other.
Tags : 
security-enhanced features, instant messaging (im), web conferencing, voice and video, sharepoint
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Vendors in this market have been challenged in their attempts to gain market visibility and awareness for their products and for the benefits they can provide compared with just throwing more hardware at the problem.
Tags : 
ibm, database application, vendor, data archiving, erp, crm application, customer relationship management
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding
    
IBM
Published By: IBM     Published Date: Apr 13, 2015
To understand why customers make the purchase choices they do, it may be helpful to look rigorously at all the moments that have an influence on their final actions. This reasoning is the basis of concepts variously called “purchase funnel,” or the “path to purchase” or “moments of truth” by product marketers. It implies a rather linear progression from general awareness to preference to decision to acquisition of a specific product. The end game is customer success. It’s what we all want to happen. Along the way we’ll do our best to illuminate: • How did the customer arrive at the best possible purchase outcome? • What decision moments can the retailer influence along the way? • What tools can the retailer use exert these influences? • What actions can the retailer take to bring them there?
Tags : 
ibm, purchasing, purchase funnel, acquisition, customer influence, retail
    
IBM
Published By: IBM     Published Date: Jul 27, 2015
Read this white paper for insight into the trends and factors driving the future of energy and utilities, and the resulting implications for the industry.
Tags : 
insights, trends, business models, iot, internet of things, situational awareness, big data cloud computing, viable substitutes
    
IBM
Published By: ICC Decision Services     Published Date: Feb 18, 2008
In today’s competitive economy, the role of advertising and promotion has never been more important. Creating consumer awareness and driving them to make a buying decision continues to be the central focus, but the average consumer is attacked with more messages than ever before. As the level of total advertising has risen, there has been an evolution of the variety of methods and types in existence. This has placed the advertising industry in a state of chaos.
Tags : 
icc, decision services, event marketing, sales, marketing, branding, customer
    
ICC Decision Services
Published By: ICC/Decision Services     Published Date: Feb 18, 2008
In today’s competitive economy, the role of advertising and promotion has never been more important. Creating consumer awareness and driving them to make a buying decision continues to be the central focus, but the average consumer is attacked with more messages than ever before. As the level of total advertising has risen, there has been an evolution of the variety of methods and types in existence. This has placed the advertising industry in a state of chaos.
Tags : 
icc, decision services, event marketing, sales, marketing, branding, customer
    
ICC/Decision Services
Published By: IHS GlobalSpec     Published Date: Jul 09, 2014
Industrial customers use content to research and make purchasing decisions. Are you giving them the info they need? Developed by IHS GlobalSpec, this white paper explains the growing importance of using content to attract, acquire and engage engineers and technical professionals. Content marketing positions your company as an expert, builds trust and introduces new products and services to a wider audience via webinars, technical articles, social media and more. Find out which content appeals most to technical professionals. Learn how to provide information that fulfills their needs at specific points in the buying cycle. And see examples of how and where industrial suppliers effectively use content marketing to deliver information that can help turn shoppers into buyers. Content Marketing for Industrial Marketers also explores the challenges of producing enough of the right content, repurposing it across multiple channels and budgeting for it. Plus, it provides the steps to start dev
Tags : 
ihs globalspec, influence buying decisions, content marketing, purchasing decision makers, content marketing strategy, building brand awareness, content marketing vehicles, engagement opportunities
    
IHS GlobalSpec
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy
Published By: InMoment     Published Date: Oct 14, 2019
In today’s experience economy, a simple request for feedback on a receipt is not enough to accurately determine your guests’ needs. Guests need to be presented with the option to share feedback at the right time for them—whenever, wherever, and however they want to. At the same time, the volume of feedback requests and the length of surveys often result in survey fatigue and other negative emotions in guests. This is just one of the complex issues restaurant brands find themselves facing today. Others include: • How do I understand the experience every individual guest has with my brand? • How do I communicate with them in a way that they’re more likely to give feedback? • How can I demonstrate awareness of the guests’ situations and acknowledge their needs?
Tags : 
    
InMoment
Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client
    
Intel Corp.
Published By: Intel Security     Published Date: Jan 20, 2015
With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw
    
Intel Security
Published By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach
    
Javelin Strategy & Research
Published By: Jigsaw     Published Date: Mar 15, 2010
One of the great myths in marketing & sales is that generating lots of 'leads' or 'awareness' for a product automatically translates into lots of new business. But quantity does not equal quality. The truth is this: if you don't have a clear denition of who your ideal customer is, why they buy, the language and stories that are meaningful to them, and where they live, you won't find them. Use this worksheet to help.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw
Published By: Jigsaw     Published Date: Nov 17, 2010
This white paper will discuss how business owners and salespeople can source the freshest business data and what to look for when choosing a business data provider.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw
Published By: Jigsaw     Published Date: Apr 07, 2011
Do you feel like you are rolling the dice every time you buy a new prospect list? How do you know that the money you spend on a new list is a good investment or not?
Tags : 
jigsaw, gen, business data, awareness, leads, sales, targeting b2b, b2b
    
Jigsaw
Published By: Jigsaw     Published Date: Apr 12, 2011
This white paper will discuss how business owners and salespeople can source the freshest business data and what to look for when choosing a business data provider.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw
Published By: Jive Software     Published Date: Mar 03, 2010
Learn how an industry-leading provider of storage and data management solutions used Social Business Software to accelerate a global branding initiative and connect with thousands of community members across one hundred countries.
Tags : 
jive, netapp community, social business software, storage, data management, hosting, online community, brand awareness
    
Jive Software
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Knightsbridge     Published Date: Sep 09, 2014
Organizational models today are shifting from hierarchical to flat. Careers are no longer an upward trajectory, but more likely to be a series of experiences, projects and development opportunities. But, a lack of awareness around the new flat organization dynamics is resulting in a perceived lack of opportunities for career movement within companies, and frustration among employees and leaders.
Tags : 
knightsbridge, career management, career development, talent development, employee engagement, manager relationship, human resources
    
Knightsbridge
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library