box

Results 351 - 375 of 436Sort Results By: Published Date | Title | Company Name
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: AdRoll     Published Date: Aug 22, 2017
For most retailers, the holidays are a frenzied rush of juggling multiple campaigns, meeting revenue goals, and hitting lofty numbers before the year is up. It’s far from a relaxing time of year. The holiday season has become critically important to online retailers. With the rise of Black Friday, Small Business Saturday, Cyber Monday, Green Monday, Super Saturday, and Boxing Day, the definition of “the holidays” has expanded substantially. While these retail days have helped distribute the holiday rush across a wider range, they’ve also made holiday campaign planning far more complex. Expanding digital channels, such as mobile and social media, have added to the immense opportunities that the holidays provide. Just last year, mobile accounted for 50.3% of all e-commerce traffic, surpassed desktop traffic for the first time ever. Knowing this, it shouldn’t be a surprise that 38% of shoppers now say they will not return to a retailer’s website if it’s not mobile optimized.
Tags : 
holiday planning, retail, black friday, social media, mobile
    
AdRoll
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense
    
AirDefense
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans, wireless security, wireless lan, wireless lans, vulnerability management, security policy, security policies, airdefense
    
AirDefense
Published By: Campaigner     Published Date: Jan 09, 2007
Deliverability remains one of the most important challenges for email marketers. That's why you need to take all the proper steps to increase their ability to get into that all-important inbox. Read this white paper to learn more about how you can boost your email program's deliverability performance.
Tags : 
email, deliverability
    
Campaigner
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: Datalink     Published Date: Aug 21, 2009
Read this white paper to learn how email storage management and email archiving technologies can help optimize resources and reduce risk and cost for your company.
Tags : 
email archiving, content management, cms, content management system, email archive, email storage, email inbox, datalink
    
Datalink
Published By: netVigilance     Published Date: May 30, 2007
Bonded Sender, the world’s leading email accreditation program, increases inbox delivery at more that 35,000 domains, averaging a 21 percent improvement across accepting ISPs according to a recent Return Path study. For marketers, email deliverability translates directly to the bottom line.
Tags : 
deliverability, deliverable, undeliverable, spam filter, filter, blocking, filtering, email marketing, email content, inbox, return path, returnpath, whitelist, whitelisting, white list, sender reputation, sender score, senderscore
    
netVigilance
Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys, it management, corporate governance
    
Preventsys
Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention, it management, phishing, secure computing, securecomputing
    
Secure Computing
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper outlines the issues faced by IT managers in meeting their compliance requirements and explains how Solidcore can be a core component of a sustainable and cost-effective SOX compliance program.
Tags : 
sox, sox compliance, sarbox, sarbanes oxley, archiving, finance, cost control, solid core, solidcore
    
Solidcore
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer
    
TopLayer
Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance, network performance management, business continuity, windows server, servers, symantec, storage, information management
    
Symantec
Published By: Symantec     Published Date: Feb 09, 2007
Imagine being able to eliminate your backup windows and recovery individual Exchange messages, folders, and mailboxes - without mailbox backups. Read this document to find out how Backup Exec 11d for Windows Servers provides the gold standard in continuous, cost-effective, high-performance disk-to-disk-to-tape backup and recovery.
Tags : 
storage, backup and recovery, email archiving, windows server, symantec, backup plan, backup, back-up, tape backup, disk backup
    
Symantec
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance, pci, pci dss, sarbox, sox, sox compliance, fisma, basel ii, reporting, analysis, analytic, netiq, net iq
    
NetIQ Corporation
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : 
compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management, access control, softlanding, soft landing, it management
    
SoftLanding Systems
Published By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : 
cenzic, web application security, white box texting, black box testing, secure web applications, cenzic, security
    
Cenzic
Published By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : 
compliance, sox, sarbanes, sarbox, sarbanes-oxley, sarbanes oxley, data management, cost control, it spending, sap, winshuttle, it management, enterprise applications
    
Winshuttle
Published By: Envisional     Published Date: Dec 21, 2006
The Internet's reach and anonymity have played a big part in the 100-fold growth of counterfeiting since the 1980s. The web provides a shop window on the world, yet it's impossible to police.
Tags : 
counterfeiting, hacker, counterfeit, brand infringement, branding, copy, envisional
    
Envisional
Published By: Campaigner     Published Date: Jan 08, 2007
This white paper is designed to educate you about the main obstacles that can prevent your email from reaching a recipient’s inbox; and the simple tactics that you can implement to avoid these obstacles.
Tags : 
email deliverability, email marketing, email, email filtering, customer reach, customer relationship management, got corp, got corporation
    
Campaigner
Published By: Infor     Published Date: May 04, 2007
What Distinguishes Strategic CFOs? What are their secrets? Why do CEOs consider their guidance so critical? How do they provide critical insight that enhances strategic planning and decision-making? Find out how strategic CFOs set themselves apart from the rest... and apply their secrets to your financial organization.
Tags : 
sox, sarbox, sarbanes-oxley, sarbanes oxley, financial, cfm, corporate financial management, finance, erp, bpm, accounting, infor, corporate governance
    
Infor
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper provides information which will help you to plan a solution for your mailbox size. Planning Modification to any email system takes just four easy steps.
Tags : 
email security, email archiving, data management, c2c, mailbox, email, personal email, enterprise email
    
C2C Systems, Inc.
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
As the need to retain corporate data has increased to meet regulatory requirements-- and best practice may dictate email meeting certain internal policies-- the very existence of PSTs is putting email more and more "at risk. So what can you do about PSTs?
Tags : 
im and email archiving, im archive, email archive, email security, data management, enterprise email, personal email, email archiving, c2c, pst, outlook, mailbox, storage
    
C2C Systems, Inc.
Published By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : 
server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance, sarbox compliance, hotels, hotelier, hospitality, case study, secure server, bluelane, blue lane
    
Blue Lane
Published By: HP     Published Date: May 10, 2011
This Illuminata Spotlight discusses HP BladeSystem Matrix, a ready-to-run IT infrastructure, and its use as an out-of-the-box platform for private clouds suited to enterprise IT.
Tags : 
illuminata spotlight, jonathan eunice, hp bladesystem matrix, cloud computing, iaas, infrastructure as a service, private cloud, itsm, it service management
    
HP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept