sophisticated

Results 326 - 350 of 406Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is an expanding part of IT organizations’ strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDC’s recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud — whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 — but only 25% have reached the level that IDC would call “mature”— that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cisco, cloud adoption, public cloud, private cloud, productivity, idc, cloudview survey
    
Cisco
Published By: SAS     Published Date: Sep 30, 2014
As analytics and Big Data have been embraced, analysts are working to become better at communicating the insights from complex analysis. This makes the use of visual analytics increasingly important as a tool to tell compelling stories and to engage decision makers in dialogue. Importantly, the best visual analytics are not necessarily the coolest, most sophisticated, or most complex. Visual analytics are most effective when there is a clear purpose and when data can be visualized and communicated in a way that is easily understandable.
Tags : 
sas, big data, visual analytics
    
SAS
Published By: Quantcast     Published Date: Feb 13, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day and in turn, Mobile marketing has developed into a sophisticated, personalised marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, advertising solutions, mobile consumers, personalized marketing channels, emerging marketing, business intelligence, market research, usability
    
Quantcast
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
Published By: IBM     Published Date: Aug 21, 2013
This brochure explores the Interactive Marketing essentials of cross-channel marketing, sophisticated email marketing, proven website personalization strategies, and new approaches to data that will improve your ability to market to individuals or specific segments of customers and prospects. In the following pages, you will learn how the right Interactive Marketing solution can help you engage each customer in a two-way, interactive dialogue.
Tags : 
interactive marketing, marketing management solutions, enterprise marketing management, ebook, marketing, website personalization, cross-channel marketing, marketing message
    
IBM
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
    
Cisco
Published By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Sailthru     Published Date: Jul 01, 2015
Every marketer uses discounts for a very simple reason: they work extremely well. But discounts can be highly destructive to profit margins and your business goals. The most sophisticated marketers are looking at how to deploy discounts strategically for long-term success, rather than simply for short-term gains. That’s why we created the Ultimate Discount Strategy Guide.
Tags : 
marketing, ecommerce, retail, discount, strategy, optimization, emerging marketing, crm & customer care
    
Sailthru
Published By: SmartFocus     Published Date: Aug 25, 2015
Combining, streamlining and analyzing data is still the biggest single struggle for marketers. Most marketers can’t use data for simple offer based marketing, let alone sophisticated contextual marketing. Part 1 of our ‘Overcoming Marketing Challenges’ White Paper series discusses how data has become a barrier for many marketers and four data steps you can take to engage more successfully with your customers.
Tags : 
data, data marketing, personalization, contextualization, email marketing, customer behavior, segmentation, customer engagement
    
SmartFocus
Published By: TheMarketingScope     Published Date: Oct 28, 2015
Everything you need to know about marketing on LinkedIn, written both strategically, and instructionally. It’s your one-stop shop to the vast opportunities that await—increase awareness, influence perception, generate high quality leads, and ultimately drive revenue.
Tags : 
linkedin, lead generation, brand awareness, marketing strategy, sales pipeline, prospecting, lead nurturing, social media
    
TheMarketingScope
Published By: CrowdTwist     Published Date: Jan 09, 2018
2017 loyalty trends highlight a strong focus on meeting customer expectations with exceptional customer experiences. Loyalty programs are becoming more sophisticated, moving beyond the traditional spend and get model, to omnichannel and multichannel programs that recognize customers for every interaction they make with a brand. Smart marketers are capturing and leveraging loyalty data to understand their customers better and market effectively to them. Download this e-book to learn more about the current trends shaping loyalty programs today.
Tags : 
    
CrowdTwist
Published By: IBM     Published Date: Feb 27, 2014
Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.
Tags : 
attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
This white paper explores some key challenges that automotive companies face in creating smarter, more sophisticated automobiles that are made up of many systems of systems and how a holistic approach can help address them.
Tags : 
ibm, automotive development, accelerating automotive, automotive innovation, automotive product, automotive companies, holistic approach
    
IBM
Published By: Marketo     Published Date: Jun 03, 2014
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue.
Tags : 
marketo, marketing automation, lead generation, crm, crm solutions, marketing solutions, lead nurturing, content marketing
    
Marketo
Published By: Quantcast     Published Date: Jan 07, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing utility, information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day, and Mobile marketing, in turn, has developed into a sophisticated, personalized marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, personalized marketing channel, mobile solutions, mobile landscape, email marketing, emerging marketing, internet marketing, marketing research
    
Quantcast
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Published By: IBM     Published Date: Mar 10, 2015
Bringing an automotive product or component to the marketplace can involve complex requirements that must be addressed by numerous teams spread across different departments, companies and geographies. This white paper explores some key challenges that automotive companies face in creating smarter, more sophisticated automobiles that are made up of many systems of systems and how a holistic approach can help address them.
Tags : 
ibm, automotive development, automotive innovation, automotive product solutions
    
IBM
Published By: NetApp     Published Date: Jun 27, 2016
One of the most effective ways to address database performance and cost challenges is to modernize the underlying hardware infrastructure. Innovations such as flash storage, converged infrastructure architectures, and sophisticated data management platforms can have a major impact. Learn more in our free eBook: Optimizing Database Storage Performance for Dummies.
Tags : 
netapp, database performance, storage for dummies, infrastructure
    
NetApp
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks
    
HP
Published By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : 
risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion
    
PassGo
Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
    
Secure Computing
Published By: Quocirca     Published Date: Nov 09, 2006
Growth in overall email volume (driven by more sophisticated spamming attacks), the need to filter out malware, and ensuring suitable content for purpose means that we now must re-address how we view email within the organization.
Tags : 
email security, it management, malware, email communications, internet security, anti spam, anti-spam, spam
    
Quocirca
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.