RecruitingBlogscom

Follow Us:

 

net

Results 326 - 350 of 7615Sort Results By: Published Date | Title | Company Name
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn how to keep your data on endpoints beyond your network.
Tags : 
deduplication,  worker productivity,  backup solution,  recover data, data security,  protecting data
    
Code42
Published By: VMware SD-WAN by VeloCloud     Published Date: Aug 01, 2019
SD-WAN is designed for modern business. With it, you can apply software-defined principles to automate, optimize, and accelerate application performance over the WAN to meet business outcomes. Quite simply, SD-WAN is one of the smartest ways to modernize connectivity to the branch office and bring end-to-end simplicity across the network. Read this e-book now to discover 6 ways SD-WAN redefines branch office networking.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Monetate     Published Date: Oct 11, 2018
Product recommendations are a proven way for marketers to drive sales, boosting the revenue potential of every shopping experience and increasing customer engagement overall. However, most current recommendations tools have not kept up with the level of personalization that customers have come to expect, and they often fall short of the precision that marketing teams need to create meaningful business impact. It may be time to reevaluate whether your solution is doing all it can to meet the needs of your customers and your team.
Tags : 
product, recommendation, solution, customer, experience, monetate
    
Monetate
Published By: Monetate     Published Date: Oct 12, 2018
Product recommendations are a proven way for marketers to drive sales, boosting the revenue potential of every shopping experience and increasing customer engagement overall. However, most current recommendations tools have not kept up with the level of personalisation that customers have come to expect, and they often fall short of the precision that marketing teams need to create meaningful business impact. It may be time to reevaluate whether your solution is doing all it can to meet the needs of your customers and your team.
Tags : 
product, recommendation, solution, customer, experience, monetate
    
Monetate
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Cobalt Networks     Published Date: Jan 23, 2015
7 Best Practices for Buying Colocation is a step-by-step handbook for organizations actively selecting a colocation provider. It offers tips and tricks from experienced colocation buyers to help you narrow down your choices, see through the sales pitches, and select the colocation vendor who will best suit your needs.
Tags : 
buying colocation, business needs, experience buyers, sales pitches, enterprise applications
    
Cobalt Networks
Published By: MoreVisibility     Published Date: May 07, 2012
Social media, social media, social media! It's all that anyone online is talking about these days. What people aren't talking about are ways to successfully measure their social media efforts. Read to learn more.
Tags : 
morevisibility, social media, marketing, emerging marketing, internet marketing, web analytics
    
MoreVisibility
Published By: Avi Networks     Published Date: Mar 06, 2018
Can your current ADC solution elastically scale load balancers and application servers? Does it provide real-time insights and visibility into traffic? There is a lot to consider when it comes to the future of your load balancing strategy. Download our free e-book today!
Tags : 
    
Avi Networks
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Net Atlantic     Published Date: Nov 09, 2011
As you plan for 2012, use the seven email marketing trends to guide your marketing initiatives. Download Net Atlantic's white paper to learn more about how to optimize your email marketing for the modern marketing era.
Tags : 
net atlantic, marketing trends, email marketing, marketing, whitepaper, emerging marketing
    
Net Atlantic
Published By: Net Atlantic     Published Date: Nov 09, 2011
This webinar provides insight into seven industry trends that are shaping the ever changing world of email marketing.
Tags : 
    
Net Atlantic
Published By: Avi Networks     Published Date: Mar 06, 2018
Vendors such as F5 Networks and Citrix NetScaler have done little to keep up with the needs of modern applications. Learn how deploying the Avi Vantage Platform resulted in TCO savings for global enterprises in our free whitepaper.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: May 17, 2019
This whitepaper outlines the key considerations that you should evaluate before you refresh your load balancers and highlights the experiences of global enterprises including TCO savings that they achieved by deploying the Avi Vantage Platform.
Tags : 
    
Avi Networks
Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt, Inc.
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Dynatrace     Published Date: Dec 16, 2015
Today's hyper-connected mobile consumers have high expectations. To compete, you must provide a responsive, superior digital experience. DevOps best practices of Continuous Delivery make this possible, but to do it right you will need a safety net.
Tags : 
dynatrace, software delivery, digital, performance metrics, mobile consumer, software development, it management, enterprise applications
    
Dynatrace
Published By: Aria Systems     Published Date: Nov 02, 2015
With millions of dollars hanging in the balance, selecting the right billing vendor is critical. Download Aria’s “7 Reasons to Evaluate Cloud Billing” to help you identify why cloud billing could be your best option. For example, cloud-billing vendors are often found to be more nimble than their on-premise billing counterparts, particularly for enterprises with multiple product lines and business in multiple geographies and currencies. Discover key advantages: • Accelerated go-to-market for products and services • An enhanced customer experience • The elimination of patches and upgrades • The ability to monetize your assets and services in new ways
Tags : 
aria systems, cloud billing, billing vendors, networking, data management, human resource technology, business technology
    
Aria Systems
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Jive Software     Published Date: Feb 24, 2014
As of January 2011 there were 600 million Facebook users and 200 million Twitter users. Many millions use social services, from sharing photos via Instagram to sharing files via Box.net to via SlideShare. So how many of your employees use social media? A lot. That’s because social has become a normal tool used to manage and organize our lives. Social tools are flexible, efficient, effective and easy to adapt for personal and business uses.
Tags : 
jive, social media, workplace, workforce, compliance, ediscovery, human resources, workflow, social applicants, productivity, it management
    
Jive Software
Published By: Clearvale by BroadVision     Published Date: Dec 26, 2012
After the swift and ubiquitous adoption of social networking sites like Facebook and Twitter among consumers,many businesses have been moving to recreate some of that success within their enterprise. Enterprise Social Networks are the result.
Tags : 
social network, broadvision, enterprise social network, facebook, twitter, social media, advertising agencies, traditional marketing
    
Clearvale by BroadVision
Published By: Clearvale by BroadVision     Published Date: Oct 22, 2012
When implemented correctly, Enterprise Social Networks increase collaboration and productivity with customers, partners and more. For those deploying ESN in their enterprise, this guide gives an adoption process that will increase chances of success.
Tags : 
business social network, business social networking, collaboration software, collaboration tools, enterprise 2.0, enterprise collaboration, enterprise social, enterprise social network, enterprise social networking, social crm, social enterprise, social network software, social networking for business, social networking in business, social networking platform, team collaboration, team collaboration software, social enterprise software, social intranet, social business
    
Clearvale by BroadVision
Published By: MuleSoft     Published Date: Apr 13, 2016
APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. Read this eBook to learn: -how to define the business objectives that APIs will help achieve -best practices to design, manage, and deploy APIs -monitor and measure the impact of your APIs
Tags : 
digital infrastructure, data, data sharing, best practices, data management, application management, enterprise applications
    
MuleSoft
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, security
    
MessageLabs
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top