RecruitingBlogscom

Follow Us:

 

audi

Results 401 - 425 of 1042Sort Results By: Published Date | Title | Company Name
Published By: Bluekai     Published Date: Aug 10, 2012
Hewlett-Packard, a leading technology provider with a global footprint, saw an opportunity to significantly improve its digital marketing efforts by creating a universal framework for user-level data collection and usage.
Tags : 
data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, hewlett-packard, omnicom
    
Bluekai
Published By: Bluekai     Published Date: Aug 10, 2012
Publishers today live in a data-driven world. It is no longer enough to simply create content, build audiences, and sell ads.
Tags : 
data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, emerging marketing, data management
    
Bluekai
Published By: Bluekai     Published Date: Aug 10, 2012
How can you analyze ALL of your disparate first and third-party audience, campaign and performance data in one central place? How can a DMP power a 360 approach to audience data management and analysis to get more bang out of your marketing dollar?
Tags : 
dmp, data management platform, crm, analytics, audience targeting, predictive audience analytics, real-time campaign analytics, campaign performance
    
Bluekai
Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance
    
EVault Inc.
Published By: CDW     Published Date: Jul 18, 2013
Understanding The Complications of Software License Management
Tags : 
cdw. software, software management, software audits, it organizations, license compliance, security, software development
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
CDW’s Mobile Expense Management solution enables organizations to view, integrate and manage mobile communications costs across the entire organization in order to make more informed strategic decisions.
Tags : 
mobility management, mobile expense management, total mobility, cdw, expense management, mobile expense, historical invoice audit, invoice process
    
CDW
Published By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you haven’t already been audited—get ready; it’s not a case of if, but when.
Tags : 
cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
With McAfee® Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy, database vulnerability management, database virtual patching, database activity monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: Turn     Published Date: Jan 07, 2014
Download this report to learn about the Digital Elite, the world's most valuable audience.
Tags : 
cloud marketing, digital audience, audience targeting, audience segments, population segment, audience insights, internet marketing
    
Turn
Published By: Turn     Published Date: Jan 07, 2014
Download this report to learn more about where and when to find the Digital Elite.
Tags : 
cloud marketing, digital audience, audience targeting, audience segments, population segment, audience insights, emerging marketing
    
Turn
Published By: Turn     Published Date: Jan 07, 2014
Download this report to learn about how the rise of the cross-channel brand.
Tags : 
cloud marketing, digital audience, audience targeting, audience segments, population segment, audience insights, emerging marketing
    
Turn
Published By: Prophix     Published Date: Apr 24, 2013
Discover how leading organizations leverage performance management software to obtain commitment from senior management, forge effective partnerships with auditors, and monitor progress throughout the year.
Tags : 
roi, closing, efficiency, analytics, accounting, finance, budgeting, data
    
Prophix
Published By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : 
audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data
    
TruSignal
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top