event

Results 76 - 100 of 1656Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jan 21, 2014
The rise of big data provides Modern Marketers with an unprecedented level of insights. But too often, it's easy to get buried by the data. We put together 40 Must-See Charts for Modern Marketers, offering analysis and intelligence today's marketers need to know across a range of disciplines from email marketing and lead management to social media and events.
Tags : 
modern marketers, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research ist ein herausragendes IT-Forschungs- und Beratungsunternehmen. Mit der Gewichtung auf technologischer Innovation und Marktstörung liefert es wichtige Erkenntnisse für führende Unternehmen der digitalen Wirtschaft. Mehr als 100 Analysten und Berater stellen diese Erkenntnisse durch syndizierte Forschung, Beratungsdienste und Live-Events für über 1.000  undenorganisationen in Nordamerika, Europa und auf der ganzen Welt bereit. 451 Research wurde im Jahr 2000 mit Hauptsitz in New York gegründet und ist ein Geschäftsbereich von The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
Published By: GE Power     Published Date: Oct 05, 2016
Cyber attacks against utilities and power producers are on the rise. Prudent leaders are taking action now to lock down their control systems and operations assets before a potentially catastrophic event occurs. Download the eBook “5 Security Imperatives for Power Executives” to learn how to prepare and react to threats to your business and the public you serve.
Tags : 
energy cyber security, power plant cyber security, digital security for power plants, dcs security, ics security, power plant cyber risk
    
GE Power
Published By: Gomez IT     Published Date: May 23, 2011
Load testing is not a new concept and many of you have probably used various load testing tools prior to major releases with varying degrees of success. Yet, we still see new web applications or newly launched web sites for which performance is not meeting the demands of the customer base.
Tags : 
web performance management, compuware, gomez, andrea mulligan, load testing, saas, web applications, emarketing program
    
Gomez IT
Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Whether due to problems with hardware, attacks from external influences, viruses or a poorly written application can cause information to become corrupt. Download this white paper to learn the five keys to preventing data corruption.
Tags : 
storagecraft, data corruption, storage environment, backup media, corrupt data
    
StorageCraft® Technology Corporation
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: ADP     Published Date: Jun 09, 2017
Payroll mistakes are common—but you can help avoid them if you know what to look out for. Follow our 5-step guide to hassle-free payroll.
Tags : 
common mistakes, steps, guide, payroll, adp
    
ADP
Published By: ServiceNow     Published Date: Oct 24, 2019
A healthy CMDB is a critical tool for maintaining high service availability, helping to prevent service outages and fix them faster when they occur. Get a detailed roadmap for successfully deploying your CMDB with this guide. Get started on the road to improved business service health today.
Tags : 
servicenow, cmdb, stage, roadmap, business
    
ServiceNow
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 24, 2019
Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smart. Here are 5 tips to keep in mind when choosing a Next Generation Firewall for your business.
Tags : 
    
Cisco
Published By: CIC Plus     Published Date: May 28, 2014
How can payroll make sure the onboarding experience is a great one for new employees? This CIC Plus brief will show how payroll can flex its strategic muscles to make the onboarding process smooth and easy.
Tags : 
payroll, payroll processing, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms, onboarding
    
CIC Plus
Published By: OnBase by Hyland     Published Date: Jun 10, 2015
When selecting enterprise content management (ECM) solutions, many IT departments face internal pressure to keep costs down and decrease the time it takes to see results, while giving end-users exactly what they want. Discover how involving IT in the buying process allows you to select an ECM solution that remains successful throughout its lifetime.
Tags : 
enterprise content management, ecm, costs, ecm solution
    
OnBase by Hyland
Published By: PGi     Published Date: May 15, 2019
Whether it’s a webinar or webcast, an online event is one of the smartest ways to connect with your audience. But not all online events are created equal. As with anything in life, your results will only be as good as the tools you’re using. We’ve collected five of the most common problems people face when producing an event so you can be prepared to fix them (or better yet, avoid them in the first place!).
Tags : 
    
PGi
Published By: Dell     Published Date: Feb 04, 2016
Not only do outdated systems pose security risks, they also prevent the organization from accessing the benefits of a modern operating system. Download this whitepaper to learn six of the most noteworthy.
Tags : 
    
Dell
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk
    
HP Enterprise Services
Published By: Datto Inc.     Published Date: Apr 15, 2013
Looking to expand your recurring revenue? Need a key to open the door to small business? Learn how Datto ALTO answers both questions, as the key to BDR for small business. Datto wants you to succeed. As the only 100% channel-focused backup, disaster recovery (BDR) and intelligent business continuity (IBC) vendor, Datto is focused on the success of our Partners. Our Partners succeed by delivering award-winning solutions to their clients that are easy to sell, easy to manage, and will eliminate downtime in the event of a natural or technical disaster.
Tags : 
small business, datto alto, bdr solutions, recurring revenue
    
Datto Inc.
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt, Inc.
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Altiscale     Published Date: Mar 30, 2015
Implementing and scaling Hadoop to analyze large quantities of data is enormously complicated. Unforeseen, very challenging problems are to be expected. However, if you can learn to recognize the problems before a fire starts, you can prevent your hair (and your Hadoop implementation) from igniting. From the Hadoop experts at Altiscale, here are some of the danger signs and problems you should watch out for, as well as real-world lessons learned for heading them off.
Tags : 
implementing and scaling, data analysis, hadoop scaling
    
Altiscale
Published By: AmVenture     Published Date: May 23, 2017
As a small business owner, it’s easy to get wrapped up in what needs to be done today, because it is what’s sitting directly in front of you. It’s so immediate and urgent, so how can you ignore it? However, to prepare for long-term success, business owners have to be willing to consider the larger picture and plan for the future. We focus on the top 7 threats you need to consider – and take action upon now – to protect your small business.
Tags : 
small business, catastrophe, prevent, business, future
    
AmVenture
Published By: MuleSoft     Published Date: Sep 08, 2016
Many enterprises recognize the opportunities of APIs, determine that they need one, then work to quickly deliver one to market. However, without a well thought-out strategy and clearly defined roadmap, most of these APIs are brought to market with critical issues that prevent them from delivering expected business results.
Tags : 
    
MuleSoft
Published By: Marketo     Published Date: May 18, 2017
Across industries, marketing increasingly plays a critical role in company growth. After all, the top expectation of CEOs polled by Gartner, in the 2014 Gartner Executive Summary for CMO Leadership, Accountability, and Credibility within the C-suite, is that the CMO would not only improve, but also own the customer experience by 2016. Combine this with the fact that digital is quickly becoming the de facto medium for customer interactions, and it’s easy to see why it’s essential that CMOs build an effective, efficient, and scalable marketing technology (aka MarTech) stack. Today, according to Forrester’s 2015 research, “Don’t Let Muddled Messaging Compromise Customer Experience,” as much as 90% of a buyer’s journey is self directed. Your buyers have moved online and many of them (likely a majority of them) prefer to be reached through digital channels.
Tags : 
integrate, social lead tool, slide share, webinar platform, lead capture, web forms, delivery assurance, event automation
    
Marketo
Published By: Broadsoft     Published Date: May 25, 2017
This eBook is for contact center management and business executives looking for ways to increase the efficiency and productivity of their contact center. • If yours is an existing contact center with infrastructure that has been built up over the years, this eBook provides best practice steps to break down the resulting application silos, unify them, and improve the operational efficiency of your contact center. • If yours is a new contact center and you have the opportunity to build your infrastructure from the ground up using modern technologies, this eBook will provide best practices to prevent building application silos.
Tags : 
    
Broadsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library