esn

Results 151 - 175 of 341Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 30, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, security, web fraud, fraud protection, cyber security, business technology
    
IBM
Published By: CrowdTwist     Published Date: Apr 18, 2016
Brand advocates are 50 percent more likely to influence a purchase over non-advocates. Yet turning your superfans into brand advocates doesn’t happen overnight. You must first understand how to identify your loyal followers and nurture those relationships to keep your superfans engaged for the long term.
Tags : 
loyalty, advocacy, fans, superfans, loyalty
    
CrowdTwist
Published By: Looker EMEA     Published Date: Sep 27, 2017
Deploy Business Intelligence in Days, Not Months. Fastest Implementation Time -Up and running in 24 days compared to 78 on average (300% faster). ? Ease of Use - Top to bottom, Looker is easier ? User Adoption - More data lovers switch to Looker Deploying a new BI platform doesn’t have to be a long, painful process anymore. See how 21 leading BI vendors compare in terms of overall user satisfaction for implementation -Download the Report >>
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Looker EMEA
Published By: SAS     Published Date: May 24, 2018
Compliance doesn’t have to be a scary word, even when facing the multifaceted challenges of the European Union’s General Data Protection Regulation. In fact, following through with plans for sustainable GDPR compliance can have many long-term benefits for your organization. That's because relying on data-driven decisions across the board sets you on track to gain a competitive edge. In February 2018, SAS conducted a survey with 183 global, cross-industry businesspeople involved with GDPR at their organizations. Based on the survey results, this e-book delves into the biggest challenges and opportunities organizations have faced on the road to GDPR compliance. Read on for advice from industry experts about the best path to compliance. Learn what steps your peers across a variety of industries have already taken and discover how an integrated approach from SAS can continue to guide your journey toward GDPR compliance.
Tags : 
    
SAS
Published By: MobileIron     Published Date: Sep 26, 2017
The shift toward modern mobile-cloud technologies is forcing organizations to completely rethink their approach to endpoint security. For instance, while credential-based security is enough to secure access in an IT-controlled desktop environment, it doesn’t transfer to the mobile-cloud world
Tags : 
mobileiron, mobile, cloud, enterprise, security, endpoint security
    
MobileIron
Published By: Dell PC Lifecycle     Published Date: Aug 13, 2018
Your business may need to keep track of dozens of different initiatives—but that doesn’t mean you need dozens of separate storage solutions to get the job done. To reduce complexity, your business may consider storage solutions that can take care of multiple jobs at once without sacrificing performance. For example, if you operate a brick-and-mortar store and an online store, you should be able to retrieve customer data from both sources without compromising transactional database performance. The all-flash Dell EMC™ SC5020 storage array aims to be just such a solution.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Aug 13, 2018
Your business may need to keep track of dozens of different initiatives—but that doesn’t mean you need dozens of separate storage solutions to get the job done. To reduce complexity, your business may consider storage solutions that can take care of multiple jobs at once without sacrificing performance. For example, if you operate a brick-and-mortar store and an online store, you should be able to retrieve customer data from both sources without compromising transactional database performance. The all-flash Dell EMC™ SC5020 storage array aims to be just such a solution.
Tags : 
    
Dell PC Lifecycle
Published By: CareerBuilder     Published Date: Apr 20, 2010
Recruitment doesn't end with a job offer. It begins from the moment your business defines its candidate audience, and continues long after an employee leaves your company. CareerBuilder's Ultimate Recruitment Guide e-Book is a definitive how-to-hire guide compiled by our team of business experts.
Tags : 
recruitment, careerbuilder, ebook, branding, awareness, engaging
    
CareerBuilder
Published By: Logicalis     Published Date: Mar 12, 2014
The buzz around the cloud is very real. It offers considerable business agility, cost efficiencies and service improvements to IT managers. What the buzz doesn’t tell you is that getting to the point where the cloud brings these benefits to your organization isn’t easy. So the real question becomes: What do you need to keep in mind when integrating cloud computing into an IT strategy?
Tags : 
logicalis, cloud strategy, high efficiency data, itsm, security needs, it management, data center
    
Logicalis
Published By: Recurly     Published Date: Mar 07, 2016
The subscription model fuels success for a wide variety of businesses, providing predictable revenue, encouraging customer loyalty, and powering growth. The key to managing a successful subscription business is a trusted, flexible and secure subscription billing solution that provides both technical and operational expertise—and that doesn’t require massive integration effort and expense.
Tags : 
recurly, subscription revenue, subscription business, billing solutions, networking, it management, data management, business technology
    
Recurly
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco, business technology
    
IBM
Published By: Xyleme     Published Date: May 06, 2015
Mobile learning doesn't have to be out of reach. We have developed this list of six best practices for taking your learning content mobile to help you start thinking about what it takes to go mobile the right way.
Tags : 
learning content management, mobile learning, content strategy, learning content delivery, learning content management system, content reuse
    
Xyleme
Published By: GrowthIntel - INT     Published Date: Jul 06, 2017
For many B2B companies, the best way to generate new business is the old fashioned one – a team of telemarketers hitting the phones to make sales appointments for their more experienced colleagues. But they are losing money every time a telemarketing agent calls somebody that doesn’t want to buy from them. This ebook will explain: • Why you could be wasting 97.6% of your time • The root of telemarketing’s targeting problem • A better way to classify companies; and • A smarter way to go to market
Tags : 
b2b, intel, telemarketing, targeting, conversation, reduce costs, business performance, sales, data efficiency
    
GrowthIntel - INT
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: Dell EMC     Published Date: Dec 01, 2017
A common misconception about hyperconverged infrastructure (HCI) is that because data services are software-defined, the hardware doesn’t matter. It’s easy to see why—the software driving HCI solutions such as the Dell EMC XC Series (in this case, Nutanix software) is exceptional. It efficiently manages data and communications across a cluster of nodes and storage tiers, keeping the cluster and virtual machines (VMs) up and running, delivering optimal performance and availability. Software-defined infrastructure is changing the way data services are delivered, making companies more efficient and agile, and reducing costs. Download the study to learn more about the latest trends. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC
Published By: Marathon Technologies     Published Date: Nov 18, 2009
High availability solutions are no longer an all or nothing discussion about expensive, proprietary solutions. Today there are wide range of affordable alternatives that provide the required level of availability at a cost justified by the risks of downtime.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, availability
    
Marathon Technologies
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
Product management positions are among the toughest to fill in the high technology industry due to the broad range of skills and real-world experiences that make for success in any given environment. A successful product manager in one organization doesn't necessarily translate to a successful product manager in your organization because the circumstances may be very different.
Tags : 
hiring, project manager, project management, zigzag
    
ZIGZAG Marketing, Inc.
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
Product management positions are among the toughest to fill in the high technology industry due to the broad range of skills and real-world experiences that make for success in any given environment. A successful product manager in one organization doesn't necessarily translate to a successful product manager in your organization because the circumstances may be very different.
Tags : 
hiring, project manager, project management, zigzag, it management, project management, product lifecycle management
    
ZIGZAG Marketing, Inc.
Published By: Cornerstone OnDemand     Published Date: Jun 23, 2016
Talent is often a major barrier of organizational growth because it involves managing the growth and personalities of your workforce. So what can stakeholders do when New Hire Nancy doesn’t have a handle on the company culture? Or when Salesman Steve is behind schedule in learning about new products and services? THEY CAN START BY GIVING AN EMPLOYEE MAKEOVER!
Tags : 
best practices, productivity, competitive advantage, human resources, hiring
    
Cornerstone OnDemand
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM
Published By: Trimble     Published Date: Jul 24, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: Minimize costly errors before they destroy your profit margin Retain the knowledge of your top estimators, even if they leave Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: Trimble     Published Date: Aug 20, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: • Minimize costly errors before they destroy your profit margin • Retain the knowledge of your top estimators, even if they leave • Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.