events

Results 201 - 225 of 236Sort Results By: Published Date | Title | Company Name
Published By: Act-On     Published Date: Apr 18, 2014
Webinars have much in common with real-world events and can deliver a similar quality of leads, at a lower cost per lead. Producing a webinar provides its own set of unique challenges, but with strategic planning, a project approach, and attentive execution, you’ll find yourself creating thoroughly professional webinars.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy, content marketing, marketing strategy
    
Act-On
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
    
Seamless
Published By: TowerData     Published Date: Jan 20, 2007
Visitors to your website are valuable leads and capturing their contact information is essential to converting them to customers. However, when prospects enter email addresses and phone numbers into a web form they often make mistakes, such as misspellings and typos, or they falsify data, which prevents you from being able to contact them.
Tags : 
email list, email append, email address, cass, customer database, tower data, database, data quality, clean data, list management, towerdata
    
TowerData
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail
    
Aventail
Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys, it management, corporate governance
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys, security
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
Security professionals are constantly being asked to justify every security project. Security risks can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement is to translate security information into business terms.
Tags : 
security, metrics, business metrics, security management, information management, aligning, alignment, business integration, preventsys
    
Preventsys
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper considers the use of email archives for compliance. It will also review how archives are trusted and look at what has to be done to ensure that integrity is maintained throughout the chain of events that take place within an email archive environment.
Tags : 
compliance, email archiving, data quality, records management, personal email, enterprise email, email security, c2c
    
C2C Systems, Inc.
Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
event management, performance management, employee performance, roi, return on investment, information management, records management, network management, compliance, records, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
hacker detection, hackers, ips, ids, intrusion detection, intrusion prevention, internet security, events manager, events management, security monitoring, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues whilst enabling you to calculate the number of GFI EventsManager instances required on your network.
Tags : 
event manager, events manager, events management, log management, security event, event log, gfi
    
GFI
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: BatchBlue Software     Published Date: Mar 27, 2009
Every small business has some system for organizing and documenting its relationships. If that system is no longer working, or could be improved upon, a new contact management system is in order. This Blue Paper will help small business owners research, select and implement the system that will work effectively for them.
Tags : 
batchbook, matternow, blue paper, contact management, small business, document management, relationships, manage leads, lead generation, sample size, communications management, task events management, project management, usability, customization, scalability, mobility, crm, sales tools, vendor management
    
BatchBlue Software
Published By: Virtela Communications, Inc.     Published Date: Nov 30, 2009
This paper will show you how to prepare your network to support your business when these unexpected events arise.
Tags : 
managed servicesssl vpn, remote access, cloud, pandemic, global wa, virtela
    
Virtela Communications, Inc.
Published By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : 
firewalls, security, sim, siem, network security, risk, firewall analytics, security incident, threat, firewall change, network configuration
    
Athena Security
Published By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : 
best practices, business management, finance, banking, financial crisis
    
SAS
Published By: Fathom Business Events     Published Date: Oct 15, 2010
Powerful stories captivate us every day. NCM Fathom explores how businesses can drive revenue and build loyalty sharing their brand's story to compel audiences to change behavior and take action.
Tags : 
storytelling, cinema events, movie theater events, events, engagement
    
Fathom Business Events
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott, disaster scam, malware reporting, inf/autorun, win32/conficker, win32/psw.onlinegames, win32/sality, bflient, autoit, tifaut.c, spy.ursnif.a
    
ESET, LLC.
Published By: Kaon     Published Date: Jul 07, 2011
In this complimentary white paper, discover how new interactive technologies allow companies to obtain quick ROIs - in the hundreds of thousands - while creating emotional customer connections at events. Learn how your 2011 marketing programs will generate greater ROI with new interactive marketing technologies.
Tags : 
kaon interactive, roi, marketing technologies, virtual product demonstrations, trade show trends, sales team, virtual technology
    
Kaon
Published By: Dell     Published Date: Nov 09, 2012
Learn how to enable Microsoft® Hyper-V virtualization role and hardware events log in Windows Server 2012 for Dell PowerEdge servers. Discover how you can view basic hardware information about your system easily without installing any software agents.
Tags : 
hyper v, microsoft hyper v, windows server 2012, dell power edge, business technology, data center
    
Dell
Published By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : 
netiq, service outages, monitoring strategy, system failure, single management view, business technology
    
NETIQ
Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept