nis

Results 1876 - 1900 of 1948Sort Results By: Published Date | Title | Company Name
Published By: SmartFocus     Published Date: Sep 04, 2015
1,75 Mrd. Menschen besitzen heute ein Smartphone. Somit können Ihre Kunden permanent online sein. Deshalb ist es für den Kampagnenerfolg entscheidend, das mobile Benutzererlebnis zu verstehen und sicherzustellen, dass alle Teile Ihrer Kampagne für die mobile Nutzung optimiert sind. Wenn Sie nicht handeln, leidet Ihre Kundenbindung. Schlimmstenfalls wandern Ihre besten Kunden zur Konkurrenz ab. Unsere einfach zu implementierenden Tipps fürs mobile Marketing können auch Ihnen helfen, Kampagneneffizienz zu steigern und Wettbewerbsvorteile zu sichern.
Tags : 
mobiles marketing, personalisierung, kontextualisierung, kundenreise, kundenverhalten, kundenerlebnis, kundenbindung, kundenbeziehungen, marketingstrategie, kampagnen
    
SmartFocus
Published By: Mimecast     Published Date: Feb 28, 2017
Vervalsing van e-mail verpersoonlijking – ook wel bekend als CEO fraude of "whaling" aanvallen vormen een groeiende bedreiging voor bedrijven van elke omvang. Deze veiligheidsbedreiging heeft in de afgelopen 3 jaar meer dan 2 biljoen Euro aan schade veroorzaakt.* Denkt u dat deze aanvallen geen bedreiging voor u opleveren? Even wakker worden! Download nu het nieuwe Mimecast – e-boek: Anatomie van een "whaling" aanval, om meer te leren over deze bedreiging voor uw organisatie, de feiten, kosten en de schade die het kan veroorzaken – en hoe u het kan voorkomen. - See more at: http://info.mimecast.com/anatomievaneenwhalingaanval.html#sthash.rjajy1cW.dpuf
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Imiteringsattacker med e-post - även känt som CEO-bedrägeri eller whaling-attacker - är en växande och kostsam risk för organisationer. Dessa lurendrejerier har lett till förluster på mer än 2,3 miljarder dollar de senaste tre åren.* Tror du att ni är säkra? Då får du tänka om! Hämta Mimecast-boken Whaling: Attackernas anatomi, för att lära dig mer om dessa skadliga hot och hur de kan stoppas.
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: RingCentral     Published Date: Dec 05, 2013
Whether you are starting a new business or expanding your existing business, you will need to choose a business phone system that meets your organisation’s requirements. This guide provides you with essential information and tools so you can understand your options, and make the decision that meets the needs - and ambitions - of your business.
Tags : 
phone system, business phone, business network, wireless phones, business communications, voip, phone lines, iphone, ringcentral
    
RingCentral
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
This white paper introduces many of the core services ADCs provide and explains how they benefit both users and application administrators
Tags : 
citrix, adc, applications
    
Citrix Systems, Inc.
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Examine a few of the enterprise-level features that IT departments and administrators will look for in a file-sharing service. Some file-sharing services make the grade at a consumer level, but don’t offer the kinds of features that make a system workable for enterprise. An enterprise-level service should be able to balance its efficiency – a primary user concern – with the needs of a company’s IT department.
Tags : 
file sharing, consumer level, enterprise level, efficiency
    
Citrix ShareFile
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: IBM APAC     Published Date: Jun 24, 2019
Every organization strives for more cyber resilience. The Ponemon Institute’s fourth annual study on “The Cyber Resilient Organization” uncovered that there is a set of habits or practices that the most cyber resilient organizations undertake to achieve greater states of cyber resilience. Download this report to review the key findings; including: • The impact of the skills gap • How complexity can be the enemy of cyber resilience • Lessons learned from high achieving cyber resilient organisations • The importance of incorporating the privacy function in your strategy. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: Lieberman Software     Published Date: Mar 27, 2012
Download "Privileged Identity Management: An Executive Overview" to learn where privileged identities can be found on your network; the challenges to discover, secure and manage them; and why unsecured privileged account credentials are dangerous.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Rocket Fuel     Published Date: Mar 04, 2015
Remember back in the day when digital advertising was simple to understand? Like popping open the hood of a 1972 Ford, all the parts were simple and visible, and how they fit together was intuitive. It made sense. Now? Piecing together the modern digital advertising ecosystem is like trying to assemble a spaceship in your living room. But as Rocket Fuel Director of Artificial Intelligence Michael Benisch explains in our latest whitepaper, using advanced systems to buy media programmatically doesn't have to be overwhelming. Michael will take you "under the hood" of programmatic buying and walk you through the process of how and why a consumer sees the ads they see. Download the whitepaper and pop open the hood before choosing a programmatic partner.
Tags : 
programmatic, programmatic partner, digital advertising, programmatic advertising, online advertising, ad platform, digital marketing, ad network, media buying, real-time bidding, digital media buys, big data, artificial intelligence, programmatic media buying, always-on marketing, dsp, big data marketing, optimize advertising performance, fixed-price bid models, marketing roi
    
Rocket Fuel
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: Plantronics     Published Date: Mar 09, 2015
This paper reveals how organisations are embracing change by adopting the principles of Smarter Working.
Tags : 
smarter working, new ways of working, smarter working for your organisation, plantronics, benefits of smart working, human resources, simply smarter office, hr workplace, unified communications, workspaces, human resources workforce
    
Plantronics
Published By: Plantronics     Published Date: Mar 09, 2015
This paper reveals how organisations are embracing change by adopting the principles of Smarter Working.
Tags : 
smarter working, new ways of working, smarter working for your organisation, plantronics, benefits of smart working, simply smarter office, it workplace, unified communications, workspaces, it workforce
    
Plantronics
Published By: Supply Chain Connect     Published Date: Apr 24, 2008
Whether you are an electrical supplies wholesaler or a manufacturer of oilfield equipment, the challenge is the same: Are you maximizing your margins by keeping your administrative processes as streamlined as possible? Or, are you wasting time and money by supporting paper-intensive processes to handle quotes, orders, ship notices, receipt documents and invoices?
Tags : 
scm, edi, erp, scc, supply chain, supply chain connect, electronic data, enterprise resource planning
    
Supply Chain Connect
Published By: Optis     Published Date: Mar 07, 2013
When employee absences can make up 36 percent of an employer’s payroll, companies need to manage leave without adding costs. Find out how an integrated system will improve the bottom line and bring people data together.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy, leave management system, absence management system, employee leave costs, absence management costs, leave management software, absence management program, leave administration, leave tracking system, absence management, leave management, online leave management, cloud leave tracking
    
Optis
Published By: Datastax     Published Date: Aug 15, 2018
Nobody likes being bogged down in operations, least of all database administrators who have enough to worry about already. The new DataStax Enterprise (DSE) has made it especially easy to be a DBA. With features like NodeSync, Advanced Replication, and OpsCenter, DSE is Apache Cassandra™ made simple. Read this white paper to learn how DSE simplifies your operations.
Tags : 
    
Datastax
Published By: Optis     Published Date: Mar 07, 2013
Companies can realize significant savings with an automated absence management system. Download the Optis study to see how one company saved over $8 million by reducing lost time and getting a handle on leave.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy, leave management system, absence management system, employee leave costs, absence management costs, leave management software, absence management program, leave administration, leave tracking system, absence management, online leave management, cloud leave tracking, leave compliance tracking
    
Optis
Published By: 3D Systems     Published Date: Feb 28, 2019
Rewrite the rules of injection molding with 3D Systems thermoplastic additive manufacturing printers and materials. Selective Laser Sintering (SLS) technology is at the heart of a growing trend in mass custom manufacturing as well as functional prototyping. The right additive technologies, materials and finishes are transforming manufacturing. Digital-direct thermoplastic manufacturing offers exceptional quality while opening the door to novel design parameters not possible with injection molding. Thermoplastic additive manufacturing also bypasses the long lead time and up-front investment in injection molding tooling. If you measure your finished parts on the three dimensions: quality, time to market, and cost per cubic inch, in many situations industrial SLS offers a better total value proposition. 3D Systems offers a wide variety of 3D printable thermoplastics, engineered for a range of applications. Materials specialists, designers, and manufacturing engineers can collaborate on
Tags : 
    
3D Systems
Published By: Workday Netherlands     Published Date: Apr 30, 2019
"Veel bedrijven beschouwen finance en HCM als verschillende domeinen. Maar, deze scheiding creëert veel problemen. Het combineren van finance en HCM in één systeem maakt het eenvoudiger om inzicht te krijgen in het totaalplaatje, om te veranderen en om te plannen voor groei. Lees de whitepaper en ontdek acht goede redenen waarom het samenvoegen van finance en HCM de beste manier is om uw organisatie voor te bereiden op de toekomst.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: May 21, 2019
"Veel bedrijven beschouwen finance en HCM als verschillende domeinen. Maar, deze scheiding creëert veel problemen. Het combineren van finance en HCM in één systeem maakt het eenvoudiger om inzicht te krijgen in het totaalplaatje, om te veranderen en om te plannen voor groei. Lees de whitepaper en ontdek acht goede redenen waarom het samenvoegen van finance en HCM de beste manier is om uw organisatie voor te bereiden op de toekomst."
Tags : 
    
Workday Netherlands
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, business technology
    
Webroot
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    64 65 66 67 68 69 70 71 72 73 74 75 76 77 78    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.