data

Results 276 - 300 of 11629Sort Results By: Published Date | Title | Company Name
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade
    
Third Brigade
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shopkeepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, marketing opportunity, business technology
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shop-keepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, business technology
    
IBM
Published By: IBM     Published Date: Oct 15, 2013
Discover the four key dimensions to personalized web marketing, and learn from the real life successes of enterprises that have made the personalized web a core part of their growth strategies.As you can see, web marketing can achieve comparable success when you make the four personalization steps your own.
Tags : 
ibm unica, click-throughs, personalizing web experience, customer needs, data sources, specific site analyses, across channels, sales and marketing opportunities, online and offline, customer interests, website traffic, referring sites, referring keywords, ibm smarter commerce
    
IBM
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: SAS     Published Date: Apr 14, 2016
Des termes tels que Big Data et Internet des Objets, peu répandus il y a encore quelques années, sont entrés dans le vocabulaire usuel non seulement des directeurs et dirigeants, mais également de toute l’organisation de l’entreprise. Nous sommes souvent surpris par la rapidité avec laquelle les choses changent, une vitesse qui dépasse notre capacité d’apprentissage et de compréhension. Et dans le même temps, nous réalisons que les dynamiques de l’entreprise et le contexte dans lequel nous évoluons sont trop lourds, trop coûteux, trop complexes. Trop.
Tags : 
    
SAS
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Globalisation, increasing competition, the constant need to expand revenue bases while cutting costs are among the many changes significantly impacting modern businesses. Are you trying to gain faster insight into business data from multiple sources and devices? Are you trying to recover agility, responsiveness and reduce overhead costs? Get the whitepaper and discover what’s the right enterprise management solution for you to remain competitive.
Tags : 
    
Sage Software (APAC)
Published By: GoodData     Published Date: Aug 02, 2013
A new sales rep's first 100 prospecting calls are the most critical and shapes their likelihood of success. So, why wait until a new sales rep’s pipeline matures to uncover if they’ll ramp to quota? Instead, let their behavior tell the story by tracking their prospecting and lead pursuit activity stream. Use these 4 metrics for evaluating your new sales representatives.
Tags : 
    
GoodData
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
The modern credit department is playing an expanded role in supporting sales and driving business growth. Traditionally, credit departments have focused on identifying potentially poor customers, thereby reducing losses and mitigating risks. Although this remains a critical function, credit departments also possess a wealth of data that can be mined to identify new business opportunities. With the help of new technologies, credit can work with sales departments by tapping into customer data and sharing insights for increasing sales. Download this white paper to learn more!
Tags : 
    
Dun & Bradstreet
Published By: SurveyMonkey     Published Date: Oct 23, 2015
Watch our webinar, 4 Steps to Building a Customer Satisfaction Engine. SurveyMonkey's Director of Customer Success, Jeffrey Coleman, will show you how to: - Ask questions that yield actionable data - Scale follow-up actions and improvements - Analyze survey data and get key metrics - Close the loop by turning data into action
Tags : 
survey monkey, customer satisfaction, customer success, data analytics, survey data, client services, customer operations, salesforce, sfdc service
    
SurveyMonkey
Published By: Clarabridge     Published Date: Dec 03, 2013
The purpose of this white paper is to provide organizations with a four step roadmap that details how organizations can use VoC to make Product Management more customer-centric and significantly increase the odds of consistently delivering products that are successful in the marketplace.
Tags : 
clarabridge, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty, market share, marketplace, voice of the customer, operationalize voc, customer insights, integrate structured data, integrated unstructured data, business value, customer feedback, text analytics software, product management, voc in product management
    
Clarabridge
Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies, management data, itam lifecycles, manage environment, automate maintenance, automate remediation, troubleshoot solution, service levels, it service levels, tangible results, distributed systems, automation streamlines, it management
    
Kaseya
Published By: Kaseya     Published Date: May 13, 2015
While seemingly counter intuitive, organizations can actually create IT efficiencies without having to cut service levels by adopting a systems management strategy that embraces the concept of “Discover, Manage, Automate and Validate.”
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya
Published By: Viavi Solutions     Published Date: Apr 01, 2015
Big data projects are becoming reality for nearly every major enterprise. According to a recent survey, 49 percent of respondents say they are implementing, or likely to implement big data projects in the future. Twelve percent already have. With big data comes surprising impacts to your network. The 4 Steps to Surviving Big Data white paper will help you identify problems before they start.
Tags : 
big data, data projects, network performance, data management, network impact
    
Viavi Solutions
Published By: Altiscale     Published Date: Aug 25, 2015
Weren't able to attend Hadoop Summit 2015? No sweat. Learn more about the latest Big Data technologies in these technical presentations at this recent leading industry event. The Big Data experts at Altiscale - the leader in Big Data as a Service - have been busy at conferences. To see all four presentations (in slides and youtube video), click here. https://www.altiscale.com/educational-slide-kit-2015-big-data-conferences-nf/ • Managing Growth in Production Hadoop Deployments • Running Spark & MapReduce Together in Production • YARN and the Docker Ecosystem • 5 Tips for Building a Data Science Platform
Tags : 
hadoop, hadoop technologies, hadoop information
    
Altiscale
Published By: Teradata     Published Date: May 02, 2017
Read this article to discover the 4 things no data warehouse should be without.
Tags : 
cloud data, cloud security, cloud management, storage resource, computing resources, data warehousing, data storage, cloud efficiency
    
Teradata
Published By: GoodData     Published Date: Aug 02, 2013
Salesforce provides a tremendous repository of customer information and interactions that’s organized and easily accessed. But that’s not enough! Once you begin to really use it, the questions you ask your salesforce data become more sophisticated. Then you start to uncover holes in your data, reporting strategy and Salesforce analytics itself. Download this white paper for 4 tips that are a surefire way to improve your salesforce analytics.
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales, business technology
    
GoodData
Published By: Kaminario     Published Date: Aug 16, 2016
With data center budgets under enormous pressure your investment decisions matter more than ever. Download the at-a-glance guide and get insights into: •How to de-risk storage buying decisions •Why Kaminario all-flash is different •What this means for customers like utility company COBB EMC.
Tags : 
kaminario, kaminario storage, enterprise storage, all-flash, all-flash array, all-flash arrays, flash storage, all flash, all flash array, all flash arrays, storage, business technology
    
Kaminario
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel®.
Tags : 
    
Dell EMC & Intel
Published By: Oracle     Published Date: Jul 05, 2017
Your company’s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today’s slightly sluggish network could become tomorrow’s downtime disaster. No matter what challenge may arise, you don’t get extra time, staff, or budget to deal with it. Plus, since the whole company relies on IT, everyone notices when you’re underwater.
Tags : 
revenue loss, tarnish brand, consumer confidence, dns services, high performing networks, workflow, dns
    
Oracle
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.