att

Results 276 - 300 of 3854Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: TriNet     Published Date: Apr 23, 2012
Download this report to learn about success stories and recommendations on how to take full advantage of innovative technology to help your efforts to attract and retain top talent.
Tags : 
ecosystem, employers, recruiting, streamline, democratic, scientific, professional, networks, linkedin, viadeo, jobvite, branchout, facebook, hiring, career development, data management, data center
    
TriNet
Published By: TriNet     Published Date: Nov 26, 2012
Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
workforce management, human resources, best practices, diverse workforce, enterprise applications, human resource technology, business technology
    
TriNet
Published By: Brightcove     Published Date: Jul 01, 2011
Brightcove Video Cloud gives you everything you need to deliver professional quality video to audiences on every screen.
Tags : 
brightcove, free trial, publishing online video, content, viewers, audience attention, online video advisor, industry-leading tools, analytics
    
Brightcove
Published By: First Data     Published Date: Apr 25, 2013
Traditional direct mail campaigns often deliver anemic response rates and direct mail campaigns sweetened with discounts don’t fare much better. Poor results combined with escalating printing and mailing costs and changing consumer expectations means that businesses must find more effective ways to get consumers’ attention.
Tags : 
direct mail, gift cards, prepaid incentive, coupon, call to action, incentive cards, direct marketing, customer experience, lead generation, customer engagement, foot traffic, grand opening, customer data, consumer behavior, relationship marketing, loyalty program, direct response, mailing list, card activation, shopping patterns
    
First Data
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
There are many attributes to consider when choosing sourcing options, some more obvious than others, such as hourly rate. However, when evaluating the true costs of sourcing, leading organizations also look at other critical factors associated with business-critical projects--such as agility, integration with other operations, security risks, scalability, public image, and business understanding-- that can make all the difference to ensuring successful project outcomes.
Tags : 
collaborative consulting, domestic solution, sourcing model, cost comparison, constrained workforce, offshore, financially constrained, user interaction, integration
    
Collaborative Consulting
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue, media promotions, measurable influence, maturity level, data management, data center
    
Collaborative Consulting
Published By: Acxiom Corporation     Published Date: Mar 12, 2014
In July 2013 Acxiom commissioned Forrester Consulting to evaluate how companies use the data they collect from their customers to make better decisions on their marketing campaigns by gauging their experiences and attitudes around their use of and future vision for using customer data across multiple marketing channels. In order to understand this topic, we conducted interviews with 11 executives representing a range of roles and perspectives, including consumer packaged goods companies, financial services organizations, and agencies.
Tags : 
acxiom, forrester, data, marketing, marketing campaigns, cross channel, customer data, market research, targeting, data analytics, life cycle management
    
Acxiom Corporation
Published By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Aug 06, 2018
When buying a workstation, price-performance matters. But it’s not the only consideration. Also important is aligning features and capabilities with user applications and workloads. So are system optimization, expandability and support. While many buyers — especially in graphics, video and multimedia fields — might consider Apple’s iMac, iMac Pro and MacBook Pro models best suited to their needs, they may be selling themselves short in many ways. This paper provides a checklist for buyers to compare Apple’s newest high-end offerings with the latest Dell Precision workstations.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The largest DDoS attacks have increased greatly in strength, doubling in attack size during 2016. They are bigger, more complex, and require more expertise to defend against than past Distributed Denial-of-Service (DDoS) attacks. They are not limited to a specific industry.
Tags : 
mira botnet, cyber attack, ddos, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Angriffe auf Webanwendungen bzw. DDoS-Attacken lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Die Angriffe können vertrauliche Daten und Websiteressourcen für illegitime Zwecke zugänglich machen, die Performance reduzieren oder Seiten sogar vollständig offline nehmen. Verantwortungsvolle Unternehmen blockieren proaktiv Webangriffe, um ihren Ruf, die Verfügbarkeit und Performance der Website sowie ihre vertraulichen Daten zu schützen.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Das Mirai-Botnet nutzt Hunderttausende von internetfähigen Geräten, die nur über ein schwaches standardmäßiges Kennwort verfügen. Durch Installation von Malware übernimmt Mirai die Kontrolle über die Geräte und errichtet auf diese Weise eine weltumspannende Armee von infizierten Bots. Bis zum Zeitpunkt der Attacke durchsucht jedes betroffene Gerät das Internet nach weiteren angreifbaren Geräten und infiziert diese. Das Internet der Dinge besteht aus Milliarden von Geräten, die Daten senden und empfangen können und heutzutage fast überall anzutreffen sind. Private Sicherheits- und Unterhaltungsgeräte wie Internetkameras, digitale Videorecorder (DVR) und Router werden häufig mit der Mirai-Malware infiziert.
Tags : 
    
Akamai Technologies
Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams, defence, key topics, security guidance, data management, business technology, data center
    
Websense
Published By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: KeyBank Commercial Banking     Published Date: Aug 31, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. These surveys help us discover overall industry sentiment on topics of importance to you. We believe that the more we know, the better we can serve you. Check out what leaders are saying about their outlook on the U.S. economy, expansion plans, and their thoughts on changing healthcare policy when you read our latest quarterly report.
Tags : 
middle market, us economy, economic outlook, business acquisitions, business acquisitions, business expansion
    
KeyBank Commercial Banking
Published By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
    
Key Private Bank
Published By: Key Private Bank     Published Date: Apr 05, 2018
From budgeting daily expenses to deciding a career path, attending college brings plenty of opportunities for teenagers to make the right—and wrong—financial decisions. That’s why parents of college-bound children should utilize opportunities to instill money and wealth preservation lessons in their children. But knowing where to start can be daunting. The experts at Key Private Bank have narrowed down the best ways to help you discuss important money lessons with your teens, so that you can set your children up for a lifetime of financial success. Read about the four wealth lessons you can start introducing to your children now when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
financial responsibility, college money management, managing your money in college, college money tips, college spending tips, how can students spend money wisely, save money in college, budgeting in college, budgeting college students, personal finances for college students, credit cards and college, student loans, college loans, managing student loans, monthly budget for college students, savings accounts for students, spending habits of college students, better spending habits in college, money management for students, college cash management
    
Key Private Bank
Published By: SAS     Published Date: Jul 14, 2015
An Enterprise Approach to Fraud Detection and Prevention in Government Programs.
Tags : 
fraud, detection, prevention, cost savings, efficiency
    
SAS
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis, networking, knowledge management, data management
    
SAS
Published By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for Exchange 2013 are right-sized solutions including servers, storage, networking and services that have been optimized for Microsoft Exchange. There are two HP Flex-Bundles for Exchange. One has been configured for customers who have 200–499 mailboxes and another one for customers with 500-1000 mailboxes. These solutions are low risk investments because HP understands how to build infrastructures for Microsoft environments and applications. HP and Microsoft have the longest standing relationship in the IT industry spanning 30 years. During this time, HP has gained a deep and comprehensive understanding of Microsoft products. HP has more than 34,000 trained Microsoft specialists, with over 13,000 of them attaining Microsoft-certification. HP has been named Microsoft Enterprise Partner of the Year five times and is Microsoft’s largest Gold Certified partner.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept