soc

Results 276 - 300 of 3072Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: May 15, 2015
Le cloud privé VSPEX™ pour Microsoft Windows Server avec Hyper-V est une solution complète de virtualisation testée par Cisco et EMC qui permet d'exécuter des applications Microsoft et qui vous est proposée par votre partenaire de confiance. Conçu pour la flexibilité et validé pour l'interopérabilité et un déploiement rapide, le VSPEX utilise votre environnement Microsoft tout en réduisant la complexité et les risques généralement associés à la conception, à l'intégration et au déploiement d'une solution d'exception.
Tags : 
cloud computing, erp, productivity, applications, efficiency, migration. cisco
    
Cisco
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
It’s a new era in IT. The end-­user workforce is mobile, social, and putting huge strains on your Virtual Desktop Infrastructure (VDI). It’s time for a new model, one that liberates you from costly infrastructure maintenance and delivers the service and availability end-­users demand. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, et Xeon Inside sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Esker     Published Date: Dec 08, 2014
Traditional accounts payable (AP) departments face the challenges associated with processing paper invoices on a daily basis— challenges that can take away your company’s competitive advantage. Luckily, there’s a better way to handle AP processing: automation. See how AP automation solutions can help you: • Process vendor invoices up to 65% faster • Reduce purchase-to-pay costs by 40-60% • Achieve processing accuracy up to 99% • Maintain 100% process visibility • Automatically archive invoices electronically Learn more about the benefits your company can achieve with AP automation– Read the eBook now!
Tags : 
automation, operations, accounts payable, manual inefficiencies, ap workflow, cost, erp system, data recognition, applications, invoicing
    
Esker
Published By: Network Automation     Published Date: Dec 02, 2008
Accudata Technologies, provides flexible access to data validation through innovative technology and cutting-edge data transmission. Accudata serves as an access hub for validating information associated with telephone numbers, cellular numbers and IP locations while also providing line information database storage of phone numbers and corresponding information.
Tags : 
network automation, automate, accudata technologies
    
Network Automation
Published By: ITinvolve     Published Date: Apr 16, 2013
Demonstrating compliance with policies is a chore for any IT operations organization and often seen as a distraction from the "real work" needed to keep IT services up and running. What if there was an approach that enabled you to demonstrate compliance with policies easily and also helped you better manage day-to-day operations as well? Read this use case document to understand how social knowledge collaboration can help you achieve this today.
Tags : 
itinvolve, compliance with far less effort, social knowledge collaboration, collaboration, it services
    
ITinvolve
Published By: Gigya     Published Date: Jun 08, 2015
As channels fragment and consumer identities multiply, businesses are struggling to achieve a single customer view. This guide provides actionable strategies to achieve this “holy grail” to better understand your audience, build relevant experiences and grow customer relationships. Get tactics and examples to help you: Identify your customers across channels and devices Manage today's volume and variety of customer data Integrate and apply data across marketing campaigns Build more personalized customer journeys
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security, customer experience/engagement
    
Gigya
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
It’s a new era in IT. The end-­user workforce is mobile, social, and putting huge strains on your Virtual Desktop Infrastructure (VDI). It’s time for a new model, one that liberates you from costly infrastructure maintenance and delivers the service and availability end-­users demand. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Yammer     Published Date: May 23, 2012
The enterprise social software market is exploding thanks to converging trends of consumerization, cloud, and mobile. In this must-read report, "The Forrester Wave: Activities Streams, Q2 2012", Forrester Research Inc. evaluated five social software vendors with core strengths in the stream based on the overall strength of vendors' current offerings, a clear product strategy, and vendor market presence. In a detailed look at the space, Forrester named Yammer as a leader.
Tags : 
yammer, enterprise social, integration, cloud, adoption
    
Yammer
Published By: BillingPlatform     Published Date: Apr 18, 2019
Digital transformation, typically associated with front-office changes like sales and marketing, has begun to revolutionize billing practices for forward-leaning enterprises. This infographic highlights the importance of evolving your billing for the digital economy. Discover the 4 survival tactics offered by cloud-based billing platforms.
Tags : 
    
BillingPlatform
Published By: IBM     Published Date: Mar 13, 2014
Learn how your e-business can improve its overall online customer experience by understanding why customers behave the way they do.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, internet marketing, online marketing, customer experience, customer behavior, intent, customer experience optimization, website development, social media, e-commerce, emerging marketing, customer experience/engagement
    
IBM
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance
    
Actiance, Inc.
Published By: Esker     Published Date: Jun 29, 2016
Tired of high costs, low visibility and other headaches associated with processing fax and email orders? Let us be your guide to better order management! Read the Guidebook to learn specific ways your company can save time and money with electronic order processing while keeping customers happy.
Tags : 
best practices, business optimization, business management, productivity
    
Esker
Published By: Esker     Published Date: Feb 03, 2017
Tired of high costs, low visibility and other headaches associated with processing fax and email orders? Let us be your guide to better order management! Read the Guidebook to learn specific ways your company can save time and money with electronic order processing while keeping customers happy.
Tags : 
best practices, business optimization, business management, productivity
    
Esker
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
In September 2012, the New York City Board of Health approved a measure to ban the sale of large sodas and other sugary drinks in restaurants, movie theaters, sports arenas and street carts in a first of its kind restriction in the US. At the forefront of this measure was Mayor Michael Bloomberg. The mayor noted that 6,000 New Yorkers die every year from obesity-related illness. Some ethnic groups in the city have rates of overweight and obesity approaching 70 percent of adults. African-American New Yorkers are three times as likely, and Hispanic New Yorkers twice as likely, as white New Yorkers to die from diabetes.1 Is this social policy run amuck? Is it, as some have suggested, an infringement on individual rights? Or is it simply recognition that health issues cannot be treated in isolation from the many other factors that affect an individual’s or a community’s health?
Tags : 
    
Group M_IBM Q119
Published By: Adobe     Published Date: Mar 07, 2013
Our eighth Digital Intelligence Briefing, in association with Econsultancy highlights key digital marketing trends for 2013, and outlines the challenges and opportunities which organisations are (or should be) paying close attention to this year.
Tags : 
digital marketing trends, adobe, social media engagement, targeting and personalisation, mobile optimisation
    
Adobe
Published By: Adobe     Published Date: Nov 06, 2012
Adobe has released the 2012 Digital Marketing Optimisation Survey Results, which focuses on the key areas where digital marketers need to excel in order to ensure success: personalisation, social media, mobile, and customer experience.
Tags : 
adobe, digital marketing, optimization, optimisation, web content management, customer experience, website development, emerging marketing, social media, internet marketing
    
Adobe
Published By: Adobe     Published Date: Oct 22, 2014
Sometimes email is the forgotten marketing channel. It’s not as new or topical as social or mobile, but it’s as reliable and profitable as ever. A study from the Direct Marketing Association says that email provides a $39.40 return on every dollar invested into it. We’ve produced a marketer’s guide that discusses the next frontier of email marketing. Learn the advantages of triggered and retargeted emails, and get real-world insights into smart email marketing from C Spire Wireless and others.
Tags : 
marketing channels, marketing guide, triggered emails, re-targeted emails, emerging marketing, internet marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: Jun 08, 2015
Get it now and see how the usage of social streaming apps is spiking. Explore metrics to help you decide whether to go paid or organic on Facebook. Discover which regions are heating up in search engine marketing. And so much more.
Tags : 
adobe, social, facebook, search engine marketing, sem, roi, streaming apps, meerkat, periscope, paid impressions, organic impressions, yahoo, bing, google, ctr, optimization, cpc, tablet, smartphone, desktop
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2014
Social media is more than friends and likes, tweets and followers, pins and mentions. According to the Q4 2013 Adobe Digital Index Social Intelligence Report, it’s time for marketers to take social advertising seriously. With higher click-through rates and lower prices, the pressure is on to bring social into your overall media mix. Adobe can help manage, forecast, and optimize all your ads.
Tags : 
adobe, social intelligence, social media, social media marketing, social advertising, click through rate, ctr, digital marketing, online advertising, internet marketing, media mix, forecasting, social engagement, customer experience/engagement, online video marketing
    
Adobe
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.