Skip to main content
 

proactive

Results 176 - 200 of 444Sort Results By: Published Date | Title | Company Name
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazon’s ever-evolving trends and requirements, you must also to take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, we’ll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more. "
Tags : 
    
ChannelAdvisor
Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Download to learn more about why you need to be proactive about fleet maintenance management.
Tags : 
    
Vehicle Tracking Solutions
Published By: ttec     Published Date: Oct 16, 2019
Omnichannel, in its most complete definition, means taking into account individual customer needs and perspectives to create seamless customer experience within and across multiple channels. The customer is in control, which creates amazing customer experiences and reduces friction for users and the business. With a true omnichannel experience, each conversation is a continuation from the last and customers don’t have to reiterate their problems multiple times to multiple people. It provides better insights into a customer’s next action, and it enables more personalized product recommendations and proactive outreach. Through technology and analytics, brands can improve their operational efficiency, optimize their channel mix, and take advantage of lower-cost channels, all while enabling a better experience for their customers.
Tags : 
    
ttec
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Unified Infrastructure Management (CA UIM) is the only solution that provides unified analytics to proactively resolve issues. The solution’s single platform architecture delivers comprehensive infrastructure coverage so you can optimally manage hybrid IT environments and meet the needs of agile IT operations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Unified Infrastructure Management (CA UIM) est la seule solution du marché capable de fournir des fonctions analytiques unifiées pour une résolution proactive des problèmes. Son architecture sous forme de plate-forme unique offre une couverture complète des infrastructures, afin que vous puissiez gérer de façon optimale les environnements IT hybrides et répondre aux besoins des équipes IT agiles.
Tags : 
    
CA Technologies EMEA
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc
Published By: Dell Software     Published Date: Feb 19, 2014
In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices
    
Dell Software
Published By: HP     Published Date: Jul 29, 2008
This case study highlights how a leading transportation firm uses executive financial incentives to insure the highest system uptime for its customers. With the need to keep thousands of vehicles and employees on the move and process millions of daily transactions, keeping mission critical systems running is essential for financial performance.
Tags : 
mission critical, high availability, transportation, service management, itil
    
HP
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security
    
TriGeo Network Security
Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence, virtual desktop infrastructure, application performance, user productivity, user-centric proactive it management, slas
    
Aternity
Published By: Aternity     Published Date: Sep 29, 2011
Published by Aternity, the paper includes 8 real-world cases detailing how Aternity empowers SAP customers with a user-centric approach to proactive IT management.
Tags : 
aternity, sap, application performance, it management, training, real-time
    
Aternity
Published By: Aternity     Published Date: Apr 10, 2012
View these new on-demand videos and quickly see how a user-centric approach to proactive IT management can optimize performance, eliminate business disruptions, and increase user productivity.
Tags : 
aternity, technology, performance management, technology platform, it management, performance optimization
    
Aternity
Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue, application performance, smartphones
    
Aternity
Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm, web hosting
    
M86 Security
Published By: CollabNet     Published Date: Mar 31, 2012
By gaining timely visibility into build and test results, development teams can be more proactive in dealing with defects, and project teams gain vital information into each build, including which requirements have been addressed.
Tags : 
continuous integration, agile, alm, development teams, software delivery, build and test
    
CollabNet
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm, web hosting
    
M86 Security
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
Published By: SpectorSoft     Published Date: Dec 12, 2013
Detect Critical Network Events with Proactive Server Monitoring
Tags : 
spectorsoft, free trial, event logs, critical network events
    
SpectorSoft
Published By: LogMeIn     Published Date: Jan 15, 2014
Today’s consumer is almost ambivalent when it comes to customer service channels; this generation of shoppers simply wants service their way. Take a look at the 2013 survey of internet shoppers.
Tags : 
logmein, live chat, e-tailing, multichannel communications, live chat best practices, channel usage, channel satisfaction, chat frequency, social media, retailer response time, proactive chats, chat receptiveness, chat session, success factors, customer satisfaction, chat availability, influence on purchase
    
LogMeIn
Published By: Heroix     Published Date: Jan 23, 2013
Enterprises that adopt a proactive approach to IT resource capacity planning, using the most advanced methods and tools available, are ensuring that their IT environments are right-sized to enable corporate growth and improve company performance.
Tags : 
virtualization, cloud computing, network, capacity planning, resource planning
    
Heroix
Published By: CDW     Published Date: Jul 11, 2013
In government, Big Data presents both a challenge and an opportunity that will grow over time.
Tags : 
cdw, big data, electronic records, cloud, cloud services, social networks, smart sensors, business intelligence
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.