target

Results 376 - 400 of 1056Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Fitbit     Published Date: Mar 21, 2017
"Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. View this webinar and see how you can: * Manage your wellness program by defining your workforce according to personas * Motivate each employee based on fitness goals - regardless of their generation * Increase engagement with targeted communication and attractive incentives
Tags : 
    
Fitbit
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 21, 2019
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: G/O Digital     Published Date: Nov 13, 2014
To stay ahead of the competition in this constantly changing environment, you need to understand which marketing tools work best for your business. Today, companies are employing integrated marketing to help target, engage, and convert new and existing customers. Download this whitepaper to learn ‘how’ and ‘why’ you need these top five digital marketing services for your local business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
Published By: G/O Digital     Published Date: Nov 13, 2014
As an HVAC company, you have to understand how to connect your services to your targeted audience’s typical purchase cycle. You have to think about how your clients find you, where they are researching your specific services, and what prompts them to call your business versus your competitor. Download this guide for quick and easy steps to improve digital advertising for your local business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
Published By: G/O Digital     Published Date: Sep 13, 2016
• Getting and staying in front of shoppers is key. 55 percent of respondents would be somewhat to very likely to click on a retargeted ad from a previous website they had visited. • Reviews make a difference to the consumer. Only 8 percent of respondents said online reviews never factor into their decision to purchase at a local retailer. • Relevant Facebook ads work for local retailers. Almost 1 in 2 respondents would be likely to click on a Facebook ad that aligns with their personal needs and interests.
Tags : 
retail consumers, local stores, consideration phase, repeat customers, consumer survey, social media, facebook ads
    
G/O Digital
Published By: Genesys     Published Date: Jun 19, 2019
Contact centers often pool agents into large groups of generalists to distribute work evenly. Skills-based routing takes this a step further with specialized groups. But neither approach scales properly to identify all opportunities and drive business outcomes on each interaction. Predictive routing uses artificial intelligence (AI) and machine learning to create balance—meeting targets and giving customers a personalized experience. Read Demystifying AI: Creating an AI partnership that maximizes business results to learn how predictive routing systematically: Evaluates historical and real-time data to make predictions; Makes the best customer-agent match to drive desired outcomes; Keeps agents engaged and reduces handle times.
Tags : 
    
Genesys
Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities
    
GeoTrust
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: Gleanster Research     Published Date: Oct 22, 2013
This Deep Dive from Gleanster research will explore why some marketing technologies may not be the best solution for distributed marketers and how an merging class of technology called “local marketing automation” is enabling corporate marketing to oversee brand consistency and simultaneously give local marketers autonomy and control over communications to their local target audiences.
Tags : 
    
Gleanster Research
Published By: Global Payments     Published Date: May 02, 2019
The economic face of the APAC region is changing. While the East has long been considered a source of competitively priced raw materials and manufacturing services, the spending power of its inhabitants - and their increased fondness for international travel - has transformed it into a force to be reckoned with. It’s estimated that, over the next five years, 88% of the growth in the global middle class will be in the Asia Pacific region.1 If multinational companies hope to take advantage of this vast new target market, they will need to adapt their expansion strategies and offer APAC customers a tailored retail experience.
Tags : 
apac growth, global payments, luxury brands, trusted payments, localized purchasing, retail, wechat pay, alipay
    
Global Payments
Published By: Globalscape     Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you’ll learn: - 3 layers most targeted: the network, data & users - Bad security practices - Why Managed File Transfer is a critical component to combat bad practices
Tags : 
globalscape, managed file tracker, data security, data breaches
    
Globalscape
Published By: Godfrey     Published Date: Oct 24, 2008
Many B2B marketing professionals are happy with a 2% response on their mailings. Others are thrilled to get a 0.5% click-thru-rate on their email marketing campaign. If that’s you, you are probably using mass direct marketing techniques; not the relationship marketing possible with today’s targeted direct marketing technologies.
Tags : 
godfrey, click-thru-rate, email marketing campaign, targeted mailing approach, direct marketing plan, b2b direct marketing, interactive/pr agencies
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Why are podcasts important? First, podcasts are another innovative way for B2B marketers to communicate directly with their target audiences. Second, podcasts allow marketers to deliver fresh, authentic content, to humanize their companies, to position their companies as thought leaders and to encourage creative thinking. And third, podcasts are becoming the "medium of choice" for customers and prospects who want information fast — in an easily digestible format.
Tags : 
godfrey, organic search, paid search, offline communications, search engine performance, search engine optimization, pay-per-click advertising, interactive/pr agencies
    
Godfrey
Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.