Skip to main content
 

word

Results 251 - 275 of 586Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Burton Group     Published Date: Apr 08, 2008
Industry debate about the relative merits of OpenDocument Format (ODF) and Ecma 376 Office Open XML (OOXML) highlights the significance of the productivity application market shift from binary and proprietary file formats to vendor- and product-independent Extensible Markup Language (XML) models. The competitive stakes are huge, and the related political posturing is sometimes perplexing.
Tags : 
odf, document, open document format, burton group, xml, ooxml, office open xml, microsoft office, word, microsoft word
    
Burton Group
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, passwords, memory cards, smart credentials, authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
smart credentials, hardware, software, passwords, features, outdated physical access
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Zuberance     Published Date: Feb 11, 2012
Forward-thinking restaurant marketers are boosting positive Word of Mouth and sales by finding and activating their enthusiastic customers (AKA "Brand Advocates.") Learn how Rubio's Fresh Mexican Grill is doing this now and how you can too.
Tags : 
restaurant marketing, word of mouth marketing, social marketing, social media roi, brand advocates, reviews, yelp, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, emerging marketing, social media, sales
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
Energizing your enthusiastic customers (AKA "Brand Advocates") can bring you the ultimate prize: a powerful marketing force whose recommendations drive sales. Read social marketing success stories in Hospitality, Software, Fitness, Consume
Tags : 
hospitality, travel, software, consumer electronics, restaurants, word of mouth marketing, social marketing, social media roi, brand advocates, reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, emerging marketing, social media, advertising agencies
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
Companies that systematically identify and energize their enthusiastic customers (AKA "Brand Advocates") to recommend their brand and products online are getting at least a 10X ROI in media and sales value. Download this Zuberance whitepaper to learn more.
Tags : 
marketing, word of mouth marketing, social marketing, social media roi, brand advocates, online reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, social media, advertising agencies, traditional marketing
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
Word of Mouth is the "world's most powerful sales tool," according to Nielsen. In today's social-media-connected world, the voice of your customers is more influential than ever. But is Word of Mouth Marketing effective in B2B environments?
Tags : 
marketing, word of mouth marketing, social marketing, social media roi, brand advocates, online reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, b2b marketing, b2b social media, zuberance, emerging marketing, social media, advertising agencies, traditional marketing, sales
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
In the social media era, Word of Mouth can make or break a hotel. Download the whitepaper to learn how to find and activate your most enthusiastic guests (AKA "Brand Advocates") to recommend your hotel, boosting ratings and bookings.
Tags : 
hospitality, travel, software, consumer electronics, restaurants, word of mouth marketing, social marketing, social media roi, brand advocates, reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, social media, advertising agencies, e-commerce
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
The over-saturation of advertising, and an ever-increasing distrust of ads, has led to a decline in the effectiveness of Paid Media. All the while, Earned Media is only gaining momentum, and for good reason. Read why earned media is so powerful.
Tags : 
marketing, word of mouth marketing, social marketing, social media roi, brand advocates, online reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, paid media, social media, zuberance, email marketing, emerging marketing, crm & customer care, traditional marketing, sales
    
Zuberance
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
"WordPress.com does everything possible to ensure ease-of-use when it comes to our systems, but we also do everything possible to be both flexible and stable," said Barry Abrahamson, Systems Wrangler for Automattic, the company behind services including WordPress.com. "Layered Tech's willingness to innovate with us helps keep WordPress.com among the world's most popular sites."
Tags : 
layered tech, wordpress, hosting solution, blogging, web publishing, dedicated hosting
    
Layered Tech, Inc.
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security
    
PC Mall
Published By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, mobile. mobilizing, windows applications, microsoft windows
    
Citrix Systems
Published By: Facebook     Published Date: Apr 17, 2012
Want to learn more about how to connect and build lasting relationships, create optimized Facebook Ads, acquire new customers and generate powerful word of mouth recommendations via your fans on Facebook?
Tags : 
facebook, marketing, social media, social media marketing, web analytics, business marketing
    
Facebook
Published By: LogMeIn     Published Date: Oct 08, 2015
This infographic illustrates how live chat users compared to non-users perform across key metrics such as revenue growth, and cost reduction as well as creating positive customer word-of-mouth.
Tags : 
live chat, customer service, customer support, live chat success, best practices for agents and admins
    
LogMeIn
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.