Skip to main content
 

word

Results 251 - 275 of 561Sort Results By: Published Date | Title | Company Name
Published By: Zuberance     Published Date: Feb 11, 2012
The over-saturation of advertising, and an ever-increasing distrust of ads, has led to a decline in the effectiveness of Paid Media. All the while, Earned Media is only gaining momentum, and for good reason. Read why earned media is so powerful.
Tags : 
marketing, word of mouth marketing, social marketing, social media roi, brand advocates, online reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, paid media, social media, zuberance, email marketing, emerging marketing, crm & customer care, traditional marketing, sales
    
Zuberance
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
"WordPress.com does everything possible to ensure ease-of-use when it comes to our systems, but we also do everything possible to be both flexible and stable," said Barry Abrahamson, Systems Wrangler for Automattic, the company behind services including WordPress.com. "Layered Tech's willingness to innovate with us helps keep WordPress.com among the world's most popular sites."
Tags : 
layered tech, wordpress, hosting solution, blogging, web publishing, dedicated hosting
    
Layered Tech, Inc.
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security
    
PC Mall
Published By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, mobile. mobilizing, windows applications, microsoft windows
    
Citrix Systems
Published By: Facebook     Published Date: Apr 17, 2012
Want to learn more about how to connect and build lasting relationships, create optimized Facebook Ads, acquire new customers and generate powerful word of mouth recommendations via your fans on Facebook?
Tags : 
facebook, marketing, social media, social media marketing, web analytics, business marketing
    
Facebook
Published By: LogMeIn     Published Date: Oct 08, 2015
This infographic illustrates how live chat users compared to non-users perform across key metrics such as revenue growth, and cost reduction as well as creating positive customer word-of-mouth.
Tags : 
live chat, customer service, customer support, live chat success, best practices for agents and admins
    
LogMeIn
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Understand the impact of social media in Born Sinner vs Yeezus on same day album release.
Tags : 
wom, word of mouth, social media conversation, online conversation, earned media, online consumer opinion, social media
    
Crimson Hexagon
Published By: McAfee     Published Date: Jan 23, 2013
DLP solutions must move beyond simple keyword matching and regular expressions. Learn how Gartner evaluates DLP providers and why McAfee is again a leader in the 2013 Gartner MQ for Content-Aware DLP.
Tags : 
dlp, data loss prevention, content-aware dlp, context-aware dlp
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp, windows defender, boot time protection, 2012 windows server security, endpoint protection 2012, smartscreen technology, adobe flash security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae
    
McAfee
Published By: RightAnswers     Published Date: Sep 04, 2013
Every day, technology plays a bigger and bigger role throughout corporate America, corporate success becomes increasingly dependent on productive use of information technology – and IT support grows more critical. But while excellent IT support rapidly returns users to productive work, the information necessary to that excellence is often fragmented in different parts of the IT organization. Effective knowledge management empowers service desks – and even users themselves – by enabling quick, accurate and consistent user solutions. That leads to measureable benefits for your business. This brief explores 20 metrics that measure those benefits – in other words, your “return on knowledge.”
Tags : 
return on knowledge, knowledge management, rightanswers, knowledge, measuring business benefits, crm, customer relationship management, crm, b2b, crm & customer care
    
RightAnswers
Published By: RightAnswers     Published Date: Sep 11, 2013
Customer service for B2B is challenging: products and services can be complex and the knowledge needed to solve customer problems is often fragmented throughout an organization. But effective knowledge management empowers customer service reps – and even customers themselves – while providing measurable benefits to your business. It enables quick, accurate and consistent customer solutions. This brief explores 20 metrics that measure those benefits – in other words, your “return on knowledge.”
Tags : 
return on knowledge, knowledge management, rightanswers, knowledge, measuring business benefits, crm, customer relationship management, crm, b2b, crm & customer care
    
RightAnswers
Published By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016
This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.
Tags : 
vasco, identitiy management, portal security, patient security, password protection, cybersecurity, electronic health records, privacy and security
    
VASCO Data Security International, Inc.
Published By: Epson     Published Date: May 10, 2018
Online, mobile, omnichannel, untethered, data mining, automation, and remote communication are all now buzzwords surrounding the new technologies and resources financial institutions have to help them re-invent their branch experience. Capabilities are available today that were not imagined a decade ago. This is an exciting time for those institutions that can look to the future and enhance their offerings. While technology is driving change, it can also be a tremendous challenge for financial institutions as they work to keep pace and even take advantage of the dramatic shift in customer needs and expectations. Millennials, baby boomers, small businesses – all are important market segments with very different wants and needs. Driven by technology, the new demand is for a complete online presence, complemented by more flexibility in personalized services, and specialized expertise available in every branch. Suffice it to say, financial institutions of all sizes and in every geography a
Tags : 
    
Epson
Published By: Intouch Insight     Published Date: May 15, 2018
From "actionable insights" to "voice of the employee (VOE)", there are many buzzwords related to customer experience management. This handy 3-page guide will help you decode all of the industry buzzwords. Inside you'll find: • Age of the Customer • CX Action Campaigns • Data Mining • Double-Barreled Question • Key Driver Analysis • Net Promoter Score • Omnichannel • Many more!
Tags : 
    
Intouch Insight
Published By: Recorded Future     Published Date: Feb 13, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: SafeNet     Published Date: Sep 08, 2010
Combat Man-in-the-Browser (MiTB) Attacks with an Integrated Solution that Combines Strong Certificate-Based Authentication from SafeNet with an On-board Portable Browser.
Tags : 
safenet financial services, online banking, security, identity protection, etoken ng-flash, password, man-in-the-browser attacks, mitb
    
SafeNet
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The Software-Defined Data Center (SDDC) is an overarching philosophy for implementing better data centers. The most basic way to think about an SDDC is as a combination of virtualized computing resources, plus software-defined storage and networking. In addition, SDDC often includes overarching security aspects: in other words, SDDC abstracts and automates all the compute, storage and networking aspects that are traditionally physical, and it can put that automation and abstraction to use in enhancing security.
Tags : 
data center, software, defined, sddc, implementation, automation, security
    
McAfee EMEA
Published By: RES Software     Published Date: Apr 08, 2013
De ontwikkeling in IT heeft de afgelopen jaren niet stil gestaan. Alleen al het concept ‘Bring Your Own Device’ (BYOD), een gevolg van Het Nieuwe Werken, veroorzaakt een verandering in de manier waarop ICT-beheer vandaag de dag wordt uitgevoerd. De grens tussen werk en privé en de technologie die thuis of op het werk gebruikt wordt, vervaagt steeds meer nu werknemers persoonlijke apparaten als een tablet of mobiele telefoon, ook op de werkvloer gebruiken. Of andersom, wanneer de arbeidskracht de werklaptop thuis op de bank nog even voor een persoonlijk rondje surfen openklapt.
Tags : 
    
RES Software
Published By: RES Software     Published Date: Apr 08, 2013
In de haast om aan regelgeving of klanteisen te voldoen, hebben organisaties miljoenen uitgegeven aan het implementeren van security en compliance maatregelen, hetzij per situatie hetzij per maatregel. Dit heeft geresulteerd in een asset-centric security benadering, waarbij we focussen op de IT infrastructuur en zorgen dat deze veilig is. In de huidige veelzijdige gebruikers gemeenschap is een gebruiker echter niet langer gebonden aan één enkel apparaat. Dus, hoewel het nog steeds nodig is om de assets te beveiligen, ontstaat er nu behoefte aan een user-centric benadering van security waarbij de security regels in lijn zijn met het gebruik van deze assets. Deze whitepaper geeft een overzicht van zowel de asset-centric als de user-centric aanpak van security. Deze invalshoeken zullen worden gerelateerd aan de standaard voor Informatie Security: ISO 27001.
Tags : 
    
RES Software
Published By: RES Software     Published Date: Apr 08, 2013
De Total Cost of Ownership (TCO) voor pc's is op jaarbasis zo?n €4200 per onbeheerde desktop1 en €6600 per onbeheerde laptop1. Het is dus geen verrassing dat het terugdringen van de TCO door een verbeterd beheer en automatisering de hoogste prioriteit heeft, voor zowel grote als kleine bedrijven. Vooral omdat een gemiddelde van 35% van het IT-budget van organisaties wordt besteed aan Windows-desktops en -laptops. In deze whitepaper wordt bekeken hoe geautomatiseerde producten voor zogenoemd workspace beheer kunnen helpen om de TCO van pc's met ten minste €140 per pc per jaar te verlagen met behoud van de productiviteit van de eindgebruiker.
Tags : 
    
RES Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.