RecruitingBlogscom

Follow Us:

 

overview

Results 401 - 425 of 676Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Dec 03, 2012
This white paper provides an overview of the issues and requirements needed to support the foundation for business change. Learn how new foundation is required for companies to support customer expectations for the next decade.
Tags : 
change, ibm, ibm smarter computing, smarter computing, customer support, technology, enterprise applications, business technology
    
IBM
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this survey for an overview of the priorities and needs of the top search marketers around the globe. With over 500 search algorithm changes in the past year, this survey seeks to offer guidance on how leaders continue to stay ahead in the competitive search marketing industry.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this whitepaper for an overview of how BrightEdge and Facebook are working together to target the "Social SEO" opportunity. This paper outlines simple and highly effective ways to address the Social SEO opportunity.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this white paper for an overview of how backlinks influence search results, why it's critical to use only white hat methods and how tools like BrightEdge, MajesticSEO and interactive agencies like Rosetta can be used to gain visibility and insight.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
    
Intralinks
Published By: GumGum     Published Date: Aug 14, 2013
Download this white paper for a basic overview of in-image advertising and how the agency community can use it to reach their objectives.
Tags : 
in-image advertising, display advertising, brand marketing, contextual placement, contextual targeting
    
GumGum
Published By: GoodData     Published Date: Aug 02, 2013
Explore over 50 critical sales metrics in a live, checkable and drill able environment. View essential metrics for executive overview, pipeline management, product and regional analysis, and team management, as well as vivid visualizations of historical performance trends. Download this White Paper for more information!
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections
    
GoodData
Published By: Marketo     Published Date: Oct 08, 2014
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
marketo, enterprise marketing, lead conversion, marketing roi, emerging marketing
    
Marketo
Published By: Marketo     Published Date: Dec 11, 2015
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
webinar, marketo, demo, crm, lead conversion, marketing, roi, business technology
    
Marketo
Published By: Oracle Social Cloud     Published Date: May 02, 2014
This white paper offers a brief overview of how organizations can best use social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer experience management systems in near real-time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : 
oracle, srm, social media, social data, digital marketing
    
Oracle Social Cloud
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
    
Alert Logic and Sungard Availability Services
Published By: SAP     Published Date: Dec 20, 2010
This article will discuss how SAP is working to enable mobility for its customers and provide an overview of several of SAP's key mobility tools and applications.
Tags : 
sap, mobility, competitive edge, mobile workers, sybase, enterprise mobility, mobile, applications
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
Become acquainted with the script logic functionality available in SAP BusinessObjects Planning and Consolidation 7.x, version for SAP NetWeaver. Review use cases for script logic, its architecture, various ways to execute it, and a few basic key words. Designed for individuals who will be end users of SAP BusinessObjects Planning and Consolidation or who require a product overview. The goal is to work with the SAP BusinessObjects Planning and Consolidation Excel, Word, PowerPoint and Web interfaces.
Tags : 
sap, businessobject, planning, business, technology, excel, word, powerpoint
    
SAP
Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure
    
IBM
Published By: ReadyTalk     Published Date: Sep 24, 2014
Learn how ReadyTalk Web Conferencing can make your next online meeting more enjoyable. From our amazing customer service to our simple interface, just wait until you see what your online meetings have been missing.
Tags : 
prospect, integrate, pipeline, faster, industry, eloqua, webinar, promote
    
ReadyTalk
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Schneider Electric     Published Date: Jun 04, 2014
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Tags : 
schneider, electric, data, center, facility, operations, maintenance, management
    
Schneider Electric
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt, knowledge management
    
Sunbelt Software
Published By: WebEx Communications     Published Date: Dec 14, 2007
The purpose of this document is to provide information on the data security features and functions available with WebEx Support Center Remote Support and inherent to the underlying WebEx communication infrastructure known as the WebEx MediaTone™ Network.
Tags : 
online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos
    
WebEx Communications
Published By: Vendor Guru     Published Date: Jan 04, 2008
This white paper provides an overview of the basic elements to look for when buying a phone system. It surveysthe landscape of enterprise telephony today: the features available, the pros and cons of traditional and VoIPsystems, and the adaptability of new generation equipment to rapidly changing business needs.
Tags : 
pbx, ippbx, ip pbx, voip, voip, voice over ip, phone, phone system
    
Vendor Guru
Published By: BlackBerry     Published Date: Mar 16, 2009
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Tags : 
blackberry, enterprise solution, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software
    
BlackBerry
Published By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : 
blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management, security
    
Intermedia
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top