target

Results 576 - 600 of 1060Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Apr 06, 2016
This solution guide discusses how IT incident responders can unify the Protect, Detect, and Correct stages of managing threats in order to build a comprehensive security model that more efficiently combats targeted attacks.
Tags : 
threat management, adaptive security model, targeted attacks, agile, architecture, cybercrim, security connected framework, detection, analysis, intelligence
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture, siem, security event management
    
Intel Security
Published By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : 
customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
    
Intercom
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation
    
Iovation
Published By: iSpeakVideo     Published Date: Mar 27, 2009
Thinking of adding video to your site? Read this guide to learn why it is important to use online video to increase conversions on your site and practical suggestions on the best ways to accomplish your goal.
Tags : 
ispeakvideo, online video, internet tools, website tools, website usability, website development, conversion rates, video communication, roi, multi-sensory, video production, virtual spokespeople, crm, user experience, user’s target, ivideo headers, video presentations, traffic management, video banners, online video marketing
    
iSpeakVideo
Published By: JBoss Developer     Published Date: Oct 21, 2016
In April 2014, Nissan opened a new production plant in Rio de Janeiro, Brazil with an annual production capacity of 200,000 vehicles and 200,000 engines. Along with a target of reaching 5% market share in Brazil by 2016, the plant’s opening was aligned with Nissan’s efforts to achieve 8% global market share, part of the “NISSAN POWER 88” five-year mid-term management plan initiated in 2011. To help align their strategic and business goals with their use of technology, Nissan chose Red Hat JBoss BRMS to replace their legacy system.
Tags : 
nissan, production, it optimization, strategic partners, data
    
JBoss Developer
Published By: Jebbit     Published Date: Jun 12, 2018
In the retail and eCommerce world, data can be your differentiator...or your downfall. To stand out, marketers are increasingly turning to first-party declared data to fuel their strategies. Learn how retailers are using mobile attention to collect and activate declared data for: Qualified lead acquisition and direct response Relevant remarketing with custom audiences and retargeting 1-to-1 email personalization Audience building and profiling
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Jigsaw     Published Date: Mar 15, 2010
One of the great myths in marketing & sales is that generating lots of 'leads' or 'awareness' for a product automatically translates into lots of new business. But quantity does not equal quality. The truth is this: if you don't have a clear denition of who your ideal customer is, why they buy, the language and stories that are meaningful to them, and where they live, you won't find them. Use this worksheet to help.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b, lead generation & automation
    
Jigsaw
Published By: Jigsaw     Published Date: Nov 17, 2010
This white paper will discuss how business owners and salespeople can source the freshest business data and what to look for when choosing a business data provider.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b, b2b, leads, data leads, data management/analytics, lead generation & automation
    
Jigsaw
Published By: Jigsaw     Published Date: Apr 07, 2011
Do you feel like you are rolling the dice every time you buy a new prospect list? How do you know that the money you spend on a new list is a good investment or not?
Tags : 
jigsaw, gen, business data, awareness, leads, sales, targeting b2b, b2b, leads, data leads, quality data, web analytics, list management, pay per click (ppc), data management/analytics, lead generation & automation
    
Jigsaw
Published By: Jigsaw     Published Date: Apr 12, 2011
This paper will discuss how to judge the quality of your business data and define the characteristics of your target customer and review how to craft marketing messages that resonate with your target customer.
Tags : 
quality business data, jigsaw, marketing campaign, sales, lead data, lead generation, roi, b2b lead, content management systems, web analytics, data management/analytics, lead generation & automation
    
Jigsaw
Published By: Jigsaw     Published Date: Apr 12, 2011
This white paper will discuss how business owners and salespeople can source the freshest business data and what to look for when choosing a business data provider.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b, b2b, leads, data leads, data management/analytics, lead generation & automation
    
Jigsaw
Published By: Juniper Networks     Published Date: Oct 19, 2015
Business and IT leaders are looking to virtualization and cloud computing to deliver unprecedented agility for supporting a wide range of objectives, including cost management, increased mobility, higher application availability, and greater responsiveness to customer-related opportunities.
Tags : 
network, management, mobility, application
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
Some tips on how to evaluate and select the right data center network architecture.
Tags : 
data center, network architecture, enterprise computing, it services
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
This new report from TechTarget identifies three specific challenges to overcome: Deploying an integrated suite of security services Closing the gap between intelligence and enforcement Centralizing visibility and management
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
In this paper from TechTarget you will examine: The six key considerations for building security into your architecture The value of an integrated and automated security strategy How the Juniper Unite architecture enables it all
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this TechTarget report and learn how to: Improve operational efficiency Strengthen end-to-end enterprise security Find the right automation solution Deliver bottom-line results
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
Juniper’s integrated security solutions are known for successfully protecting some of the world’s most demanding mission-critical environments, based on four core criteria from TechTarget: Breadth of capabilities in one solution Mission-critical performance and reliability Threat intelligence: open source and expertise
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
According to TechTarget, partnering with the right vendor to modernize your network can benefit business in three ways: Simplify the network to make management more efficient Secure the network for total visibility and control Adopt an open framework for agility and scalability
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 31, 2016
To gain transformational benefit from a private and/or hybrid cloud deployment, I&O leaders should look beyond provisioning compute and storage to address the networking domain; those that don't will sacrifice business agility.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.