Skip to main content
 

word

Results 1 - 25 of 561Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Acrolinx     Published Date: Apr 01, 2015
In January 2015, Acrolinx launched a research project to read and evaluate the world’s content. Using a proprietary linguistic analytics engine, our software reviewed 150,000 individual, public-facing web pages from 340 companies around the world. That represents 20 million sentences and over 160 million words. Read this white paper to read the findings of this research report and the effect of content.
Tags : 
search marketing, website development, emerging marketing, internet marketing
    
Acrolinx
Published By: Act-On     Published Date: Sep 19, 2014
Over the last 12 years, a massive amount of material has been written about Search Engine Optimization (SEO). Much of this material remains applicable today; However, there are a growing amount of out-dated tactics still being touted as best practices (exact match domain names, keyword density targets, exact anchor text, and so on). In this eBook, you’ll learn the current best practices in SEO that companies of all sizes can use to increase site visibility, increase traffic, and most importantly, improve conversion rates.
Tags : 
marketing content, business, solve, information, prospects, customers, educate, inform, sales process, guide, characteristics, marketing, targeted, points, audience, buying cycle, crm & customer care, sales
    
Act-On
Published By: Act-On     Published Date: Apr 20, 2015
In this eBook, we'll tell you everything you need to know to make your content SEO-friendly.
Tags : 
act-on, ebook, page content, seo, search engine, search optimization, keyword search, organic clicks
    
Act-On
Published By: AdHawk     Published Date: Nov 06, 2017
Download this easy-to-read glossary to understand any and all Google AdWords definitions!
Tags : 
google, adwords, adhawk
    
AdHawk
Published By: AdHawk     Published Date: Nov 06, 2017
In this guide, Adhawk uses their extensive knowledge of the AdWords platform to first get you started with your first campaign and then walk you through the various tips and tricks you will need to be successful.
Tags : 
google, adwords, adhawk, adwords platform
    
AdHawk
Published By: AdHawk     Published Date: Nov 06, 2017
Download this guide to understand AdWords Ad Extensions more thoroughly!
Tags : 
google, adwords, adhawk, ad extensions
    
AdHawk
Published By: Adobe     Published Date: Jan 12, 2015
As advertising continues to evolve, we continue to provide the latest insights and trends. The Adobe Advertising Benchmark 2014 report gives you the information you need to identify better opportunities to make the most of your advertising efforts.
Tags : 
adobe, benchmark, search, spend, cpc, pla, advertising, google, yahoo, bing, tends. device, ctr, germany, mobile, keywords, audience, search marketing, internet marketing
    
Adobe
Published By: Adobe     Published Date: Aug 09, 2017
First impressions matter, and the right imagery can mean the difference between content that moves the needle and content that’s ignored. Read our guide Beyond 1000 Words to learn: • Why the imagery you choose should be as strategic as the written message behind it • How to use imagery to enhance the impact of your content marketing efforts • What types of imagery you should use to meet your brand objectives
Tags : 
imagery, impressions, content marketing, brand objectives
    
Adobe
Published By: Adobe     Published Date: May 15, 2018
Adobe article that condenses/highlights key findings from the Econsultancy Digital Marketing in the Financial Services and Insurance Sector 2017 Study, an in-depth, 5000+ word report covering FSI executives’ opinions on: – General trends in retail banking, investment banking, and insurance – Internal structures their companies are using to execute digital transformation – The biggest threats/disruptions in the industry – The biggest priorities in 2017 (leaders are focusing on both customer retention and customer acquisition, mainstream is focusing just on customer retention) – Main sources of sales and leads (digital + mobile are steadily increasing sources) – Digital marketing budgets & investment areas (leaders are investing more in digital marketing automation and analytics) – Use of the cloud and AI to automate analysis and marketing – The importance of multichannel personalization – Innovation in the types/formats of products/services provided (leaders are focusing on imp
Tags : 
    
Adobe
Published By: Adobe     Published Date: Dec 07, 2017
With more and more competition for our increasingly short attention spans, it’s no wonder we’re seeing reliance on visuals as the leading form of communication across the web. Even the most well-thought-out ideas and well-written content will get lost in the shuffle if the visual elements aren’t equally compelling—or don’t communicate the right message. That’s why the imagery you choose should be as strategic as the written message behind it. It’s not enough to settle for the first applicable image you find in your stock library—you need to ensure every image is on brand and conveys the right idea. Download this whitepaper for a few ways to use imagery to meet your brand’s content marketing objectives.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
Adobe article that condenses/highlights key findings from the Econsultancy Digital Marketing in the Financial Services and Insurance Sector 2017 Study, an in-depth, 5000+ word report covering FSI executives’ opinions on: – General trends in retail banking, investment banking, and insurance – Internal structures their companies are using to execute digital transformation – The biggest threats/disruptions in the industry – The biggest priorities in 2017 (leaders are focusing on both customer retention and customer acquisition, mainstream is focusing just on customer retention) – Main sources of sales and leads (digital + mobile are steadily increasing sources) – Digital marketing budgets & investment areas (leaders are investing more in digital marketing automation and analytics) – Use of the cloud and AI to automate analysis and marketing – The importance of multichannel personalization – Innovation in the types/formats of products/services provided (leaders are focusing on i
Tags : 
    
Adobe
Published By: Airfoil PR     Published Date: Apr 21, 2010
In our latest Point of View, "The Dirtiest Word In Business," Airfoil has assembled a collective set of best practices to help technology marketers meet the communications challenges of a new digital decade.
Tags : 
airfoil, innovation, pov, public relations, integration, communications
    
Airfoil PR
Published By: Akamai     Published Date: Mar 14, 2011
Imagine: "We've been breached." A stomach dropping statement whether you're hearing the words or speaking them.
Tags : 
akamai
    
Akamai
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungs- und DDoS-Angriffe lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Für die meisten DDoS-Angriffe (Distributed Denial of Service) ist nicht viel Know-how erforderlich. Angreifer können günstig Ressourcen mieten, die auf entsprechenden Seiten leicht zu finden sind. Trotz des geringen Preises führen DDoS-Angriffe zu vielen Problemen: • Betriebsunterbrechung • Verlust vertraulicher Daten • Niedrigere Nutzerproduktivität • Rufschädigung • Beeinträchtigung von Partnerschaften und Kundenbeziehungen • Umsatzverlust Je nach Branche können sich so schnell Schäden von Zehntausenden US-Dollar ergeben – in einigen Fällen geht der Schaden sogar in die Millionen. Nur 2 % der Unternehmen gaben an, ihre Webanwendungen seien in den vergangenen 12 Monaten nicht Opfer eines Angriffs geworden. Bei 98 % war das Gegenteil der Fall.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Dem sprunghaften Anstieg von Mobilgeräten in den letzten Jahren ist es zu verdanken, dass Apps für Unternehmen zu einem der wichtigsten Kanäle geworden sind, über den sie mit ihren treuesten und wertvollsten Kunden kommunizieren. Wenn Konsumenten mobile Geräte nutzen, verbringen sie 85% der Zeit mit Apps1, und mittlerweile ziehen moderne Nutzer Apps sogar dem Fernsehen vor.2 Obwohl die Verwendung von Apps in den vergangenen zwei Jahren um über 60% zugenommen hat, ist die Anzahl der Apps, mit denen jeder Nutzer interagiert, mit ungefähr 27 pro Monat vergleichsweise stabil geblieben.3 Nutzer wünschen sich also kaum neue Apps, interagieren aber stark mit den bereits genutzten. Das mobile Internet vergrößert also die Reichweite von Unternehmen, und Apps sind eine leistungsstarke Verbindung zu ihren besten Kunden.4 Nutzer, denen das Unternehmen wichtig genug ist, um dessen App herunterzuladen und zu installieren, sind die motivierteste Zielgruppe und die treuesten Fans.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.