box

Results 101 - 125 of 435Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 31, 2017
Infographic on cloud-based content management and collaboration solutions connecting the dots
Tags : 
ibm, could-based content, management, collaboration, content management
    
IBM
Published By: IBM     Published Date: Jul 31, 2017
Read this article to learn how you can address the modern challenges of securing business information in the cloud.
Tags : 
ibm, cloud, business security
    
IBM
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Iterable     Published Date: Sep 07, 2018
Email marketing continues to be the best digital channel for ROI, so delivering dynamic, personalized messaging to the inboxes of your customers is of the utmost importance. In fact, for 77 percent of consumers, email is the preferred messaging channel, dwarfing demand for SMS, push notifications and social media communications. When you are determining the right email marketing strategy for your business, it’s natural to wonder how the industry leaders are conducting their campaigns. A¬er all, if they’re on top, then they must be doing everything right...right? To glean best practices, we analyzed the email marketing strategies adopted by the top 100 e-retailers in the United States to study how they engage with their customers. These companies represent industries ranging from apparel and electronics, to auto parts and pet supplies, but all have the single goal of getting their users to go from inbox to checkout. We note what companies are doing across the board, as well as what spec
Tags : 
    
Iterable
Published By: Amazon Web Services     Published Date: Feb 01, 2018
Moving Beyond Traditional Decision Support Future-proofing a business has never been more challenging. Customer preferences turn on a dime, and their expectations for service and support continue to rise. At the same time, the data lifeblood that flows through a typical organization is more vast, diverse, and complex than ever before. More companies today are looking to expand beyond traditional means of decision support, and are exploring how AI can help them find and manage the “unknown unknowns” in our fast-paced business environment.
Tags : 
predictive, analytics, data lake, infrastructure, natural language processing, amazon
    
Amazon Web Services
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Microsoft     Published Date: Feb 15, 2017
Read this e-Book to find out how Azure Virtual Machines can deliver more productivity and help companies control their own budget decisions, infrastructure and in turn, their own destinies.
Tags : 
cloud, iaas, infrastructure as a service, smb's, infrastructure, productivity, azure, digital transformation, cloud computing
    
Microsoft
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Published By: SAS     Published Date: Nov 10, 2014
Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.
Tags : 
sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling, metadata management, data center
    
SAS
Published By: Box     Published Date: Nov 28, 2012
We adhere to the highest industry standards for security at every level of the Box experience. You can share, manage and access your content with confidence.
Tags : 
mobile collaboration, enterprise collaboration, mobile content, wireless, business technology
    
Box
Published By: Box     Published Date: Nov 28, 2012
This IDC Insight explores the emerging category of solutions that offer access to business content (folders, files, documents, etc.) on mobile devices.
Tags : 
collaboration, collaboration solutions, mobile workforce, mobility, mobile workers, mobile enterprise, wireless, business technology
    
Box
Published By: Box     Published Date: Nov 28, 2012
End users need the right tools for document collaboration, and in the era of consumerization, they'll find them... with or without you!
Tags : 
cloud, cloud file sharing, cloud file sharing vendors, cloud vendors, dropbox, box, google drive, files sharing, wireless, business technology
    
Box
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses, information security, security threats, fireeye platform, protecting data, cyber targets, cybercriminals, prime target, midsize businesses, security, it management
    
FireEye
Published By: Epicor     Published Date: Jul 18, 2017
Big-box retailers often have the resources, product variety, and name recognition to get ahead of smaller competitors. However, small and midsize businesses are able to crush the big-box stores where it matters most—the customer experience. Whether by design, geography, or as a matter of principle, small and midsize retailers are closer to their customers and are able to engage them on a level that big-box stores simply cannot. This closeness—combined with the right retail management system—allows smaller business to deliver a superior shopping experience with: • Special orders • Predictive inventory analysis • Digital, mobile channels and device integration This white paper—written by Innovative Retail Technologies and sponsored by Epicor—explains how the right software solution leads to a more agile retail strategy, which then leads to a better experience for your customers.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Published By: Epicor     Published Date: Oct 29, 2018
Plant. Feed. Nurture. Grow. Retailers today face a variety of new challenges including a concentrated selling season, customers being lured away by big-box stores, and constant margin pressures. In this guide you’ll hear directly from Lawn and Garden retailers and learn how they have leveraged Epicor Eagle N Series to grow their business and drive superior customer service. Epicor Eagle software helps lawn and garden businesses grow and thrive. Download this guide and understand how businesses like yours use retail technology from Epicor to realize a wealth of benefits.
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, shopping cart software, customer satisfaction, customer loyalty, point of sale (pos) system
    
Epicor
Published By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : 
employee habits, corporate it systems, dropbox, it infrastructure, security, it management, knowledge management, enterprise applications
    
Nasuni
Published By: SolarWinds     Published Date: May 18, 2015
It’s the newest trend in virtualization, simplifying hardware deployment with its “everything-in-a-box” approach, but what does it mean from a management perspective?
Tags : 
hyper-convergence effect, virtualization trends, hardware deployment, management perspective, it management
    
SolarWinds
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Dotmailer     Published Date: Nov 06, 2018
This year’s Hitting the Mark showcased the email and customer experience tactics of 100 global brands. The report revealed both the triumphs and pitfalls of marketers as they bid to foster everlasting relationships from the inbox to the counter. This guide draws inspiration from the winning tactics adopted by brands big and small. Implement these now and you could come up top in next year’s Hitting the Mark.
Tags : 
    
Dotmailer
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept