RecruitingBlogscom

Follow Us:

 

proactive

Results 351 - 375 of 426Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Jul 30, 2013
Implementing a marketing automation solution is just the beginning to achieving marketing greatness. You need to make sure your people, process, and technology are aligned to get the fastest speed-to-results. But you can't map bad processes to new technology, you need complete user adoption in order to be successful, and you need to proactively grow your solution as marketing continues to evolve.
Tags : 
marketing automation, marketo, lead nurturing
    
Marketo
Published By: Marketo     Published Date: Jan 08, 2014
Implementing a marketing automation solution is just the beginning to achieving marketing greatness. You need to make sure your people, process, and technology are aligned to get the fastest speed-to-results. But you can't map bad processes to new technology, you need complete user adoption in order to be successful, and you need to proactively grow your solution as marketing continues to evolve.
Tags : 
marketing automation, marketo, lead nurturing
    
Marketo
Published By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats
    
IBM
Published By: Oracle     Published Date: Sep 30, 2014
To succeed in today’s highly competitive business environment, your company needs to be customer obsessed. Your customers’ digital interactions are the narrative of your brand, and engaging with them proactively through their channels of choice is key to delivering exceptional experiences and creating loyal brand advocates. Download this paper to learn how to deliver connected buying journeys to your customers.
Tags : 
customer, obsessed, marketing, leader, digital, interactions, social, connected, networking
    
Oracle
Published By: IBM     Published Date: Feb 18, 2015
In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This white paper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
integration testing, test virtualization, ibm, test automation solutions, it management, knowledge management, enterprise applications
    
IBM
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: DataSynapse     Published Date: Feb 26, 2007
Business continuity and disaster recovery are made more difficult by the pace of business change.  Adapting to market changes requires proactive IT. For the first time, you can consolidate business continuity and disaster recovery (DR) planning in a heterogeneous IT environment with a single, central automated solution. 
Tags : 
disaster recovery, backup and recovery, business continuity, business process automation, server virtualization, server automation, datasynapse, data synapse, enterprise applications, application integration
    
DataSynapse
Published By: IBM     Published Date: Feb 08, 2008
As manufacturing goes global, initiatives to standardize processes and key performance measurements across the enterprise to unite the greater supply chain are emerging. The main catalyst? Driving down costs in response to customer and market pressures. However, mid-size companies in particular are driving performance improvements with a more proactive, strategic vision for improving performance than reactively responding to cost pressure.
Tags : 
scm, supply chain, manufacturing, manufacturer, bpm, business process, erp, enterprise resource planning, business intelligence, ibm, enterprise applications
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Reliable IBM System x servers help businesses stand apart from their competition. Scalable systems and proactive tools help you simplify your IT so you can manage complexity, growth and risk. In addition, energy efficiency, consolidation and virtualization help you lower costs. Discover the features, functions and benefits of the family of IBM System x servers and find out which one is the right choice for your business.
Tags : 
ibm, express seller, servers, system x, systemx, green
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Today, an IT-driven, customer-centric business approach isn’t a luxury — it’s imperative. More and more businesses are moving out of a cost-centric view of their IT potential and into a realization that IT can transform business processes. This white paper shows how you can maximize your IT function by leveraging ITIL best practice processes. These guidelines can help you effectively manage IT changes, assets, personnel and service levels all while reducing costs—going beyond simple IT asset management to deliver proactive IT business improvements.
Tags : 
itil, best practices, service management, asset management, ibm, ibm mi, ibm grm
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
This white paper discusses how The IBM Tivoli® Netcool® customer experience management solution offers the ability to monitor all aspects of the customer experience, to help increase satisfaction, reduce service calls, monitor the performance of new and existing services and device types — and help operations identify which issues have the greatest impact on valuable enterprise customers. It delivers the visibility you need to improve the customer experience as they interact with different aspects of your business — to help increase loyalty and drive new revenue opportunities.
Tags : 
ibm, tivoli, service quality management, service level agreement, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 22, 2009
This white paper explains the IBM Tivoli® Netcool® customer experience management solution which offers the ability to monitor all aspects of the customer experience, to help increase satisfaction, reduce service calls, monitor the performance of new and existing services and device types — and help operations identify which issues have the greatest impact on valuable enterprise customers.
Tags : 
ibm, tivoli netcool, enterprise customers, enterprise applications
    
IBM
Published By: PerformanceIT     Published Date: Aug 21, 2009
With the current demands on today's CIO and IT Managers, implementing a top notch, easy-to-use proactive network, application and server support structure that meets budgetary confines can seem like a daunting task. Until now...
Tags : 
infrastructure, network management, server management, application performance management, server support, performance management, performanceit, performance it, it management, enterprise applications
    
PerformanceIT
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security
    
Secure Computing
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer
    
TopLayer
Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention, access control, high availability, symantec
    
Symantec
Published By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : 
quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps), service portal, storage
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions – yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.
Tags : 
quocirca, business intelligence, performance management, enterprise applications
    
Quocirca
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega, security
    
Aomega
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: LANDesk     Published Date: Feb 12, 2007
As IT departments work to transition from "firefighting mode" to becoming more proactive and responsive, a key step along the path is to implement labor-saving automation tools that allow more tasks to be done more rapidly, using fewer resources and with greater predictability and reliability.
Tags : 
it management, productivity, project management, service management, groupware workflow, business process automation, bpa, it automation, automating it, security management, landesk
    
LANDesk
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security
    
GFI
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top