soc

Results 2901 - 2925 of 2968Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing, security
    
Tripwire
Published By: Quocirca     Published Date: Jul 03, 2008
As enterprises recognize the costs associated with an uncontrolled printing environment, many are turning to specialist managed print services (MPS) providers. MPS services encompass the assessment, optimization and management of the print environment. Increasingly, MPS providers are now adopting a partnered out-tasking approach by delivering flexible services that can be tailored to individual customer requirements.
Tags : 
managed print services, mps, quocirca
    
Quocirca
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft has made significant enhancements to the architecture of Microsoft Dynamics® CRM 4.0 to improve network performance. Test results demonstrate network bandwidth utilization improvements of up to 94%. Improvements were evaluated in the number of round trips, bytes sent, and bytes received. Because the bandwidth utilization associated with a page can change after the first time the page is loaded, both initial (cold) and subsequent (warm) page loads were tested.
Tags : 
microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: Oneupweb     Published Date: Jun 24, 2008
Uncover the social marketing secrets of the hottest holiday products with Oneupweb's white paper, Secrets of Social Marketing Success: How 2007 Hot Holiday Products are Being Marketed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
    
Oneupweb
Published By: Oneupweb     Published Date: Jun 24, 2008
Learn from the mistakes and successes of others in part 2 of Oneupweb's landmark social media marketing study, Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
    
Oneupweb
Published By: SchemaLogic     Published Date: Jun 11, 2008
The Associated Press, like all publishing and digital media companies, must work rapidly to meet the demands of a shifting media landscape. An exploding wave of free content on the web meant that AP not only had to deliver more content online, but needed to create more relevance and niche content in order to update traditional ad revenue models with targeted web-based products and more potential for advertising dollars.
Tags : 
schemalogic, associated press, content delivery, content management, cms, content management system, knowledge management
    
SchemaLogic
Published By: Clearswift     Published Date: Jun 09, 2008
Anyone who spends any time online cannot have failed to notice. People are using the Web in new ways; ways that make the 'brochureware' of the early Web experience look and feel decidedly flat. It's a new world, characterised by a wave of new jargon, brands and web based experiences. MySpace. FaceBook.  Wikipedia. Flickr. Twitter. YouTube. Mashups. Blogs. Newsfeeds. Download this white paper for a simple guide to the terms, opportunities and threats that Web 2.0 poses.
Tags : 
internet security, web 2, web 2.0, clearswift, social media, social networking, facebook, myspace, web 2.0, security, web security, clearswift
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.
Tags : 
enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking
    
Clearswift
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, analytical applications, database development
    
ASG Software Solutions
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
    
StrongMail
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm, knowledge management
    
IBM
Published By: IBM     Published Date: May 30, 2008
With open, flexible Web 2.0 technologies from IBM, organizations from all over the world are adding a new dimension of imagination and innovation with these advanced collaborative tools. Learn how you can benefit from social software and team-based collaboration that is helping companies to ride the Web 2.0 wave to collaborative freedom.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign, knowledge management
    
IBM
Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
    
MessageLabs
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Published By: LeapFrog Interactive     Published Date: May 07, 2008
With detailed planning and execution by an experienced agency, social media marketing (SMM) can be a valuable channel within integrated marketing campaigns, complementing and enhancing the results from other efforts.
Tags : 
leapfrog, social, social marketing, social networking, smm, sms, gaming, branding
    
LeapFrog Interactive
Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection, storage, data management
    
Diligent Technologies
Published By: Ektron     Published Date: Apr 08, 2008
As the Internet evolves, users become more and more savvy about what they want from the experience. Web sites are updated daily when they used to change monthly, and social networking sites such as Facebook and Myspace are checked more often than e-mail. Users know what they want and where to get it.
Tags : 
intranets, ektron, facebook, myspace, user experience, twitter, social networking, support, infrastructure, information management
    
Ektron
Published By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : 
acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: TRIRIGA     Published Date: Mar 31, 2008
Investments in green building strategies consistently result in significant benefits for organizations today.  Green buildings not only reduce the environmental impacts of natural resource consumption and green house gas emissions, but they also provide economical benefits such as reduced costs, improved bottom-line performance and higher shareholder value.
Tags : 
green building, tririga, environmental sustainability, dr. romm, tririga, environmental impact, green house gas emissions, emissions, bottom-line performance, social responsibility, triple bottom line, trees, tririga, tririga, energy, green, environment, environmental
    
TRIRIGA
Published By: Concentra     Published Date: Mar 31, 2008
There is a lot of interest at the moment in Web 2.0, a catch-all term for ways of making websites much more dynamic and socially interactive. What is a pity is that all the jargon about mash-ups and social media might suggest opening up your online presence this way will require lots of investment in arcane or unproven technology.
Tags : 
concentra, sharepoint, intranet, 2.0, collaboration, knowledge management
    
Concentra
Published By: iLinc     Published Date: Mar 31, 2008
iLinc's patented Green Meter technology works continuously in the background of all of iLinc web collaboration sessions (online meetings, webinars, and training/learning).
Tags : 
ilinc, salesforce, webinar, presentation, green, web collaboration, green meter, web conferencing, video conferencing, visual aid, social networking
    
iLinc
Published By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : 
compliance, vpn, retail, managed networks, easynet
    
Easynet
Start   Previous    105 106 107 108 109 110 111 112 113 114 115 116 117 118 119    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept