Skip to main content
 

block

Results 1 - 25 of 397Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features
    
McAfee
Published By: Dräger     Published Date: Nov 19, 2014
Download this free quick reference infographic to view the results from Dräger's 2014 Oil & Gas Safety Survey which reveals top roadblocks and steps toward greater safety.
Tags : 
safety, survey, oil, gas, dräger
    
Dräger
Published By: Salesforce     Published Date: Jan 06, 2016
Salesforce Research surveyed more than 2,300 global sales leaders to discover: The unifying goals, stumbling blocks, and success metrics for today’s sales teams How high-performing sales teams are evolving to stay ahead of the curve Areas where sales is doubling down to supercharge business in the next 12–18 months. This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Logicalis     Published Date: May 14, 2014
As you seek to transform your IT and enable a clear competitive edge, there will inevitably be roadblocks and unforeseen hurdles. To help you know what to expect, here are 5 common challenges and what you can do about them.
Tags : 
logicalis, it transformation, it management, infrastructure
    
Logicalis
Published By: Return Path     Published Date: Jan 29, 2013
Internet Service Providers make filtering decisions about what email to block or mark as SPAM based on three main factors. Find out what they are in “Email Sender Reputation Report: Key Factors that Impact Email Effectiveness."
Tags : 
email filtering factors, sender reputation, email blocking, email marketing
    
Return Path
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
Today’s empowered consumers want to shop anywhere, anytime and they expect nothing less than a seamless experience with all their needs accommodated as they shift among mobile, digital and physical channels. They want the freedom and choice of online shopping, balanced with the comfort and immediacy of a physical store. They want to research and select items from their armchair, check out offers when they’re on the move and then try out products in the store.
Tags : 
omni channel, retail success, customer empowerment, digital, mobile, ibm
    
IBM UK&Ireland
Published By: SubscriberMail     Published Date: Dec 12, 2008
The benefits of addressing the image suppression issue are significant. A recent controlled study by SubscriberMail demonstrated the response improvements gained by optimizing an email message to have impact even when images are not displayed. In this study, an email message that was not optimized for image suppression was sent to a test panel of approximately 50,000 subscribers. Simultaneously, a panel of similar makeup received a version of the same message optimized for non-graphical display. Compared to the non-optimized version, the optimized version saw an 87 percent increase in clicks.
Tags : 
subscribermail, image blocking, image suppression
    
SubscriberMail
Published By: Logicalis     Published Date: Sep 22, 2014
Most data initiatives face roadblocks from both technology and business perspectives. What steps can you take to resolve them, and what are the areas where an IT provider can help?
Tags : 
netapp, logicalis, data centers, data, data management, big data, digital asset management, data center services, data center knowledge, it management, enterprise applications
    
Logicalis
Published By: Logicalis     Published Date: May 06, 2014
Most data initiatives face roadblocks from both technology and business perspectives. What steps can you take to resolve them, and what are the areas where an IT provider can help?
Tags : 
hewlett packard, logicalis, data centers, data, data management, big data, digital asset management, data center services, data center knowledge, it management, enterprise applications
    
Logicalis
Published By: sevone     Published Date: Oct 23, 2014
Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.
Tags : 
    
sevone
Published By: Fujitsu     Published Date: Feb 06, 2017
When you embark on an SAP HANA transformation, your goals should include simplifying operations and empowering your business to compete and win in the digital economy. But big transformation projects like this are extremely complex. Learn key insights into common speed bumps and roadblocks that may slow you down, as well as valuable tips to help you along your transformation journey.
Tags : 
sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
    
Fujitsu
Published By: Emarsys     Published Date: May 21, 2015
Die meisten Händler werden von unstrukturierten Daten blockiert und verlieren wertvolles Potential. Userfreundliche Technologien können Daten benutzerdefiniert strukturieren und somit einen Schwerpunkt setzen, der für wertvolle Einblicke in diese Daten notwendig ist. Aber dafür ist der richtige Mix an technologischen Ressourcen notwendig.
Tags : 
retention, automation, ecommerce, marketing, insight
    
Emarsys
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security
    
Navisite- A Time Warner Cable Company
Published By: Esker     Published Date: Jan 06, 2014
Manual processing of vendor invoices presents a roadblock to the success of your accounts payable (AP) department and overall business objectives. As you look to automation to get your company on the right track, consider this guidebook your map along the 7-step path to AP automation success.
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp environment, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, regulatory compliance, procure-to-pay cycle, manual to touchless
    
Esker
Published By: Monetate     Published Date: Sep 30, 2014
Interested in starting a testing program, but struggling to get internal support? We know, it’s crazy; but take some comfort in that fact that many marketers still face the same roadblocks as you. And that’s why we created this white paper. Inside, you’ll find a specific plan on how to convince your company’s leaders that website testing is essential to the overall business.
Tags : 
website testing, internal support, buy-in, emerging marketing
    
Monetate
Published By: FinancialForce     Published Date: Dec 01, 2017
The Professional Services industry is in its fourth consecutive year of steady growth and not slowing down. If you are looking to grow your business it's crucial to evaluate your current systems and processes to ensure they are drivers and not road blocks. Download this whitepaper and read the top 9 reasons why Professional Services works better on the Salesforce platform to help drive growth and bridge the services and sales divide for smarter services delivery.
Tags : 
    
FinancialForce
Published By: Oracle     Published Date: Feb 21, 2018
Oracle debuted its Blockchain Cloud Service in October, and now one of Oracle’s early-stage partners, AuraBlocks, has already created a financial service on the platform. AuraBlocks is using blockchain to help its customer Biz2Credit verify the identity of borrowers. Biz2Credit provides loans to small- and medium-sized businesses.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
Digital developments are forever shaping the way we work, bringing new innovations through our office doors almost every day. These high-demand technologies have increased expectations, with organizations now having to drive business agility at unprecedented levels. Although we’re presented with enormous opportunity, we also face new obstacles that can block the path to success; obstacles such as the need to innovate quickly, keep costs down, and actively respond to competitive pressures.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : 
firewalls, security, sim, siem, network security, risk, firewall analytics, security incident, threat, firewall change, network configuration
    
Athena Security
Published By: Infosys     Published Date: May 21, 2018
Our client offered electronic money transfer services. For years they had provided the digital links and the networks of agents that enabled people to send money quickly and easily around the world. But digital technology introduced a number of challenges to their business. Not only were pure digital payment companies threatening the agent-based model, but their business models had lower operating costs than a network of physical agents. Also, other technologies such as virtual money transfer via blockchain were being more widely adopted. In addition, industry mergers strengthened competitors, while increased protectionism began to reduce the number of migrant workers - the core customers of our client. The digital world was looking like a difficult place to operate in.
Tags : 
money, transfer, digital, technology, business
    
Infosys
Published By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
    
Kaseya
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
Tighter security requirements and ever-faster networks are placing extraordinary demands on UTM platforms. In order to accelerate network traffic while blocking new threats, enterprises must deploy specialized hardware/software security devices.
Tags : 
fortinet, utm platform, unified threat management, network security, ssl vpn, ipv6, network performance management, security content, threat protection, traffic inspection, traffic monitoring
    
Fortinet, Inc.
Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware
    
Symantec
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf
    
Tail-f Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.