anti

Results 351 - 375 of 1132Sort Results By: Published Date | Title | Company Name
Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : 
eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : 
eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
We discuss about Internet users' behaviour when it comes to Internet security and the top ten threats of the month.
Tags : 
eset, threat report, internet security, malware industry, antivirus, cybercrime group, mobile devices
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
Selecting an antivirus for your small or medium business that won't slow you down.
Tags : 
eset, antivirus, security, smb, protection, cybercrime, precautions, safety
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : 
eset, black hat conference, hacking the car, malware, protection, security, antivirus
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime
    
ESET
Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: Jan 18, 2011
Read about how ESET NOD32 Antivirus 4.2.64.12 extends its unbroken run of VB100 success for yet another month!
Tags : 
eset, nod32 antivirus 4.2.64.12, vb100 certification, malware, rap test, detection
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: Apr 19, 2011
ESET NOD32 Antivirus 4 protects your business without creating system slowdowns that negatively impact productivity. It is effective against emerging malware and Internet threats as they are released, not hours or days later. Request your free trial today.
Tags : 
eset, nod32 antivirus 4, free trial, malware, productivity
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : 
eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: Oct 27, 2011
If you're looking to evaluate antivirus software based on its price, you're missing the larger picture. You need an antivirus solution that will work with today's complicated infrastructures that include virtualization, you need proactive protection from malware and you need an antivirus solution that won't rob your employees of productivity. Register for the "Finding the Right Antivirus Solution e-Kit" to better understand what goes into the process of evaluating antivirus software.
Tags : 
eset, technology, security, anti virus, internet security
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
Published By: Esker     Published Date: Jun 29, 2015
So why are so many organizations’ accounts payable (AP) departments still using antiquated invoicing tools? A new IOFM study aimed to find out exactly that.
Tags : 
measuring, reporting, technology adoption, accounts payable
    
Esker
Published By: Esker     Published Date: Dec 18, 2015
This eBook is for anyone wanting their AP department to realize its full potential. As we will learn, KPIs, when used correctly, are the transformative tool to do it.
Tags : 
esker, accounts payable, kpi, key performance indicator, knowledge management
    
Esker
Published By: Esker     Published Date: Jun 29, 2017
Wasted time is wasted money — and accounts receivable (AR) departments can waste a lot of both with antiquated billing and collections methods. Download the new white paper‚ Winning the Billing & Collections Battle‚ to learn how your organization can overcome common obstacles in every phase of AR by: • Automating invoice delivery without format restrictions • Giving your customers self-service access to invoices • Modernizing post-sale collections interactions • Going beyond DSO with advanced KPIs and analytics With a complete AR management solution‚ time and money is on your side!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Esker     Published Date: Jul 17, 2018
What's in the white paper? Great customer service hinges on efficient order fulfillment — especially the initial processing of a customer’s order. With thousands of sales orders coming into most large organizations monthly, this mission-critical process can demand a significant portion of customer service representatives’ (CSRs') time and attention in the quest for near-perfect input accuracy and order fulfillment. But such intensive personnel support isn’t necessary for effective order processing. Great customer service doesn’t have to be cumbersome. Sales order automation can transform customer service and operations which provide quantifiable benefits to the organization. Automation provides an opportunity to improve order management by: • Reducing error rates and decreasing costs per order • Improving process transparency from receipt to archival • Reducing reshipping and inventory problems
Tags : 
    
Esker
Published By: Esker     Published Date: Jul 09, 2019
According to a recent IOFM study, only 1 in 6 businesses track their metrics using technology like dashboards that display key data. And even if they are, they’re often uncertain that the metrics being tracked are the “right” ones. This eBook is for any AP leader wanting to take their department’s performance to the next level. As we will learn, the right KPIs (and the right solution) can make all the difference. These include: -Cost to process a single invoice -Time to process a single invoice -Invoice exception rate … and more!
Tags : 
    
Esker
Published By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : 
marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
    
ExactTarget
Published By: Expert System     Published Date: Jul 18, 2019
For publishers and information providers, your competitive advantage starts with optimizing your most valuable resource: content. In this context, semantic content enrichment has evolved from a game changing capability into a de-facto requirement for both competition and innovation. Expert System’s solutions based on our cognitive technology, Cogito®, help publishers take full advantage of content to ensure its complete availability for providing compelling content, supporting new product development, building new revenue streams and improving workflow productivity.
Tags : 
    
Expert System
Published By: Extreme Networks     Published Date: Sep 26, 2014
Les établissements hospitaliers sont aujourd’hui soumis à des pressions financières et techniques pour améliorer le traitement du patient et augmenter leur productivité. Un réseau filaire et Wi-Fi hautement sécurité et fiable est le minima requis pour supporter les données, la voix, la vidéo et les équipements et les applications métiers. Mais comment garantir continuité de service et connectivité Wi-Fi pervasive pour supporter ces éléments clés au meilleur coût ? Ce livre blanc vous guide grâce aux témoignages de professionnels de l’IT au sein de grands établissements hospitaliers. Ils y expliquent comment ils ont relevé le challenge de la mobilité en garantissant la sécurité de leurs patients.
Tags : 
extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview
    
Extreme Networks
Published By: F5 Networks Inc     Published Date: Feb 25, 2010
Learn how Domain Name System Security Extensions (DNSSEC) can add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole.
Tags : 
dnssec, dns cache poisoning, domain name system security extensions, encryption, deployment, cryptographic
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
F5 Networks Inc
Published By: FICO     Published Date: Sep 02, 2016
The unifying concept that defines FICO and its substantial technology and solutions stack is Decision Management. This term has not yet become mainstream - but it will. All business analytics activities are performed with the single aim of improving the accuracy and efficiency of business decisions. This applies to business intelligence, data visualization, data mining, business rules management, and many other forms of analysis. Unifying these activities under a single discipline means that currently fragmented analytical efforts can be combined into a single whole, with benefits that will be discussed in this review.
Tags : 
    
FICO
Published By: FICO     Published Date: Sep 02, 2016
Behind FICO® Collections Optimisation is a sophisticated decision modeling capability that quanti es the impact of an organisation’s business decisions and actions on customer outcomes such as revenue, loss and profit.
Tags : 
loans, fico, fico collections optimization, collections and recovery, c&r, resource allocation, roll rate reduction, collector performance
    
FICO
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.