event

Results 101 - 125 of 1655Sort Results By: Published Date | Title | Company Name
Published By: Broadsoft     Published Date: May 25, 2017
This whitepaper is for contact center management and business executives looking for ways to optimize the business performance of their contact center. ē If yours is an existing contact center with infrastructure that has been built up over the years, this whitepaper provides bestpractice steps to break down the resulting data silos, unify them, and optimize your contact center for business performance. ē If yours is a new contact center and you have the opportunity to build your infrastructure from the ground up using modern technologies, this whitepaper will provide best practices to prevent building data silos.
Tags : 
    
Broadsoft
Published By: NuCompass     Published Date: Oct 25, 2017
Relocation isnít an everyday event for your employees. Itís one of the most stressful life events, and it can very easily spill into work. When that happens (and it inevitably will), your organization and your relocation provider have to be prepared. Thatís why it pays to build a relationship early with your provider. If you spend the time preparing for relocation hiccups, you can proactively prevent some and be ready to take care of the rest. In this white paper, we will give you seven steps to follow to build a better partnership with your relocation provider, including: ? Understanding the significance of relocation ? Learning from successes and failures ? How to approach policies ? Personalizing your approach Download the white paper now!
Tags : 
    
NuCompass
Published By: Click Forensics     Published Date: Jun 25, 2008
What is click fraud?  Who is committing it?  Why should you be concerned about your paid search campaigns?  Learn how to identify if you are at risk with this special report from Click Forensics.
Tags : 
click fraud, ppc, paid search, roi, click forensics, pay per click, pay-per-click, fraud, budget
    
Click Forensics
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities ó and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: Red Hat     Published Date: Dec 22, 2010
Join us live starting at 7 a.m. EST on Jan. 26, 2011. The event will be on-demand worldwide the months following. The Red Hat Virtual Experience is a complimentary global online forum of Red Hat experts, partners, customers, and the open source community.
Tags : 
red hat virtual experience, cloud computing, virtualization, collaboration
    
Red Hat
Published By: PGi     Published Date: May 03, 2019
Itís true that webinars and webcasts are a great way to generate leads, launch products and interact with prospects. Yet, when it comes to attendance, less than half of those who register join the online events. Meaning, regardless of how great the content is in your webinar or webcast, it doesnít have much meaning if no oneís attending! There are plenty of effective ways to promote your online event and up your attendance rate. Some traditional ideas include creating landing pages, promoting the event on your companyís home page and sharing across social media channels. Here are a few additional out-of-the-box ideas from Team GlobalMeet that are simple and surprisingly effective ways to make sure you not only drive awareness for your event but can also get people excited to attend!
Tags : 
    
PGi
Published By: GlobalSpec     Published Date: Nov 21, 2008
Gain practical tips for making marketing work in a difficult business environment, helping to prevent a downward spiral of falling behind, gain market share from competitors who cut back, and position your company for a surge when conditions improve.
Tags : 
globalspec, engineering, technical, industrial marketers, marketing investments
    
GlobalSpec
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organizationís environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity
    
WatchGuard Technologies
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually youíll find that siloed cloud security strategies fall short of the mark. But donít wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : 
dlp, data loss, security, best practices
    
CDW
Published By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : 
firewalls, security, sim, siem, network security, risk, firewall analytics, security incident, threat, firewall change, network configuration
    
Athena Security
Published By: VMware     Published Date: Dec 18, 2012
How to prepare for and mitigate the ďBlack Swan EventsĒ in your data center
Tags : 
disaster recovery, guide, data center, virtualization
    
VMware
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: Special Counsel     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, personal data, information, connectivity, innovation, internet of things
    
Special Counsel
Published By: Adecco     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, connectivity, personal data, information, internet of things
    
Adecco
Published By: Epicor     Published Date: Oct 06, 2016
This eBook and research identify five key factors that growing manufacturers believe contributed to their business growth last year, and five risks that manufacturers believe may prevent or weaken growth in the following year. Download this how-to guide to learn more.
Tags : 
    
Epicor
Published By: McAfee     Published Date: Feb 06, 2013
Itís a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security
    
McAfee
Published By: SafeNet     Published Date: Jun 03, 2013
To learn more about the current state of the data braech epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : 
data breach, it security, data security, data protection
    
SafeNet
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
BearingPoint wanted a “one-stop-shop” for its growing marketing organization that was easy to setup and didn’t require a lot of resources. A tool was needed to help with the wide-range of marketing activities that satisfied the needs of the entire marketing team. This system needed to easily handle financial and legal requests, capture campaign and event data, support creative development and reduce manual processes that contributed to the lagging of concrete knowledge of their marketing budgets and spending at any given point in time.
Tags : 
aprimo, marketing operations, financial visibility, marketing resource management
    
Aprimo, Inc.
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors
    
Websense
Published By: Websense     Published Date: Aug 23, 2012
All DLP controls have two things in common.First, they provide the ability to identify: data-in-motion, data-in-use, data-at-rest. Read this whitepaper to find out more about DLP.
Tags : 
websense, data loss, prevention, dlp
    
Websense
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library