google

Results 101 - 125 of 389Sort Results By: Published Date | Title | Company Name
Published By: Dropbox for Business     Published Date: May 07, 2015
Dropbox is named the most popular Enterprise File Sync and Share Product over other vendors like Microsoft, Google Drive and Box.
Tags : 
efss, enterprise file sync and share, hybrid-cloud systems, data management, cloud migration, enterprise deployments, cloud computing
    
Dropbox for Business
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device
    
Druva
Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: EBSL Technologies Int'l     Published Date: Sep 26, 2010
This white paper provides an introduction to cloud computing.
Tags : 
cloud computing, service level agreements (slas), cloud computing security, virtualization, amazon cloud, google
    
EBSL Technologies Int'l
Published By: Ensight     Published Date: Dec 03, 2008
The online advertising industry is a billion-pound industry1, with hundreds of millions spent on online acquisition campaigns alone; from Pay-Per-Click (PPC) advertising on search engines like Google and Yahoo!, to banner ads, email campaigns, organic search, blogging and web PR.
Tags : 
ensight, emarketing campaigns, online advertising, acquisition campaigns, ecrm
    
Ensight
Published By: Ensighten     Published Date: Aug 02, 2012
Watch the playback on the hidden costs of website Javascript tagging in time, resources, page speed and stability. Hear the benefits of tag management systems and what to look for, plus hear how Sony increased web analytics ROI, while speeding page load.
Tags : 
tag management, digital marketing, web marketing, web analytics, digital advertising, online advertising, javascript tags, web page optimization, web page performance, page load times, ad pixels, conversion pixels, digital marketing applications, conversion tracking pixels, website tagging, google analytics, sitecatalyst, omniture, website visitor tracking, third-party cookies
    
Ensighten
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl
    
Entrust Datacard
Published By: Equinix     Published Date: Sep 28, 2015
Interconnected Commerce: A Revolution in Value Creation, commissioned by Equinix and produced by Aite Group, discusses the state of the global payments ecosystem and its evolution into a core component of commerce enablement.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends, payment processers, payment ecosystem, disruptive payments, third party payments, location based advertising, credit cards, debit cards, apple pay, google pay, contactless payments, mobile payments, mobile wallets
    
Equinix
Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows, attacks, apple, linux, mobile, operating systems, solutions, endpoint, protection
    
ESET
Published By: Fetchback     Published Date: Aug 28, 2009
Do you know what your Return Conversion Rate is? Do you even know what that metric measures? FetchBack brings you an insightful White Paper to educate you about this often overlooked metric, and how this one metric can change your entire company's culture and future.
Tags : 
return conversions, marketers, prospects, return, conversion, fetchback, analytics, retargeting, google, loyalty, retention, web analytics
    
Fetchback
Published By: ForeSee Results     Published Date: Feb 07, 2007
The world of e-business is continuing to evolve as the lines further blur between search engines, portals and content providers. Learn more about the competitive positions of Google, Yahoo!, AOL and more in this report.
Tags : 
e-business, e-commerce, google, yahoo, msn / live search, loyalty and retention, foresee, foresee results, market research, usability
    
ForeSee Results
Published By: Forrester     Published Date: Feb 24, 2014
Most brands would love to have their apps the top 25 most downloaded in the Apple App Store or Google play. With more than one million apps available, there's a great risk that your app wont stand out from the crowd. In this Forrester report, learn the 7 best practices to promote your app.
Tags : 
forrester, apps, google play, apple app, itunes, promoting, promote, marketing
    
Forrester
Published By: foxtailmarketing     Published Date: Oct 15, 2014
This eBook describes, in detail, the methods and systems required to generate sales ready B2B leads by using several different types of digital marketing.
Tags : 
foxtail marketing, b2b leads, social, google, content creation, lead nurturing, search marketing
    
foxtailmarketing
Published By: G Suite     Published Date: Jun 28, 2016
Now you can experience the ease and flexibility of open, collaborative tools while gaining better protection for your data. As Google security experts and customers share their vision for a safer Internet, discover how Google’s innovative security technology meets the unique challenges of working and living in the cloud.
Tags : 
    
G Suite
Published By: G Suite     Published Date: Jun 06, 2016
Download this white paper to learn how Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA), used Google Apps to keep his project on track and to collaborate with his teammates.
Tags : 
    
G Suite
Published By: G/O Digital     Published Date: Nov 13, 2014
A lot has changed in the 10 years since Facebook first launched. No longer are social networking sites just a place where people can stay in touch with friends. Now, 30 percent of people use Facebook as their primary source of news. While Facebook is still the number one social network, Twitter, Google Plus, LinkedIn, Instagram, and Pinterest are all growing at steady rates and millions of users are accessing these sites from the palm of their hand with smartphones and other mobile devices. Download this whitepaper to learn how you can leverage social networking to quickly reach users and entire online communities to boost your business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design
    
G/O Digital
Published By: Genesys     Published Date: Mar 01, 2013
webRTC will change real-time communication and revolutionize the future of customer service.
Tags : 
genesys, free live event, custom service, march 14th, google chrome for business
    
Genesys
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express
    
Globalscape
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
Globalsign Inc.
Published By: Google     Published Date: Dec 14, 2011
How Travelocity improved its digital marketing. Read the case study to see how Google Analytics Premium helped Travelocity optimize its digital investments and conversions.
Tags : 
digital marketing, digital, marketing, google analytics, metrics, investments, digital investments, conversions, social media, interactive/pr agencies, search marketing agencies, traditional agencies, web analytics, crm solutions/software, customer experience/engagement, business intelligence, reputation monitoring, market research, usability, e-commerce solutions
    
Google
Published By: Google     Published Date: Aug 09, 2017
This report looks at the biggest changes in firms’ expectations of their chief information security officers (CiSOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
security, ciso, chief information security officers, performance, customer experience, customer engagement
    
Google
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.