techniques

Results 351 - 375 of 424Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Meltwater     Published Date: Oct 14, 2015
Everyone needs something to strive for to keep them on track. When you (or your boss) are wondering if you’re doing a good job, key performance indicators (KPIs) are there to answer the question and nudge you to even greater heights. But what are the right KPIs? And how do you access the right data to use them effectively? Download our e-book on data-driven marketing today for a complete breakdown of KPIs by marketing role, plus the techniques and tools you need to measure your programs.
Tags : 
meltware, marketing, kpi, data, digital marketing, customer marketing, search marketing, email marketing, marketing research
    
Meltwater
Published By: Act-On     Published Date: Jan 08, 2015
Ready to move past the basics of email marketing and learn new techniques to optimize your email results? This guide will give you five tips for more successful - and more profitable - email campaigns, including: How to increase engagement with responsive design, tips for better email personalization, ideas for effective trigger emails, effective ways to integrate with social media, and so much more!
Tags : 
act-on, email guide, email campaigns, mobile emails, mobile devices, personalization, personal content, email marketing, mobile marketing
    
Act-On
Published By: Act-On     Published Date: Jul 08, 2015
Our Email Idea Lab eBook gives you six ideas to take your email campaigns to the next level.
Tags : 
marketing, strategy, guide, online marketing, email marketing, social media, content management systems, email marketing services/software, social media marketing
    
Act-On
Published By: NEC     Published Date: Aug 12, 2014
Without a doubt, performance is the database professional’s number one concern when it comes to virtualizing Microsoft SQL Server. While virtualizing SQL Server is nothing new, even today there are some people who still think that SQL Server is too resource-intensive to virtualize. That’s definitely not the case. However, there are several tips and best practices that you need to follow to achieve optimum performance and availability for your virtual SQL Server instances. In this whitepaper, you’ll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance. In this white paper, you’ll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: Deerfield.com     Published Date: Jan 20, 2007
From the moment an email inquiry reaches your company, the clock is ticking.  Read this white paper to learn effective email communication techniques, keeping your customers and prospects engaged with your organization.
Tags : 
email management
    
Deerfield.com
Published By: Silverpop     Published Date: Jan 20, 2007
In the early days of email, online marketers would happily shoot a thousand arrows in the hopes of hitting a lone bull’s eye. But in a channel long since overrun by spam and irrelevant marketing messages, marketers have turned to advanced techniques and technology to ensure their messages are delivered, anticipated and welcomed by recipients.
Tags : 
email vendors, vendors, email marketing, email management, vendor selection
    
Silverpop
Published By: NovaRising     Published Date: Mar 26, 2007
There is no doubt that science is involved in email marketing, however, it is the art of that science which delivers true response.  Explore standout campaigns, the technologies they employ, and their creative techniques in this presentation.
Tags : 
email marketing, newsletter design, deliverability, database and list managers, enewsletter, e-newsletter, enewsletters, e-mail marketing, novarising
    
NovaRising
Published By: Aladdin     Published Date: Aug 21, 2009
This in-depth 14-page white paper explains all available anti-spam techniques and how they are used by eSafe. It also includes a "Dare to Compare" competitive matrix for easy vendor/solution selection.
Tags : 
spam, anti-spam, anti spam, comparison guide, comparison chart, comparison table, email security, anti-spam software, aladdin
    
Aladdin
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
This white paper provides an overview of the most useful personalization techniques and discusses how to combine personalization strategy with personalization techniques.
Tags : 
email marketing, personalization, customization, personalize, customize, broadvision
    
Clearvale by BroadVision
Published By: IBM     Published Date: Feb 25, 2008
An organization’s success and ability to react to market and environmental changes are now more dependent than ever on an effective and efficient IT infrastructure. This white paper provides a starting point for organizations contemplating server consolidation. Download this guide for an overview of server consolidation concepts and techniques, plus guidance on methodologies that should be employed.
Tags : 
servers, migration, consolidation, infrastructure, server hardware, ibm
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
With the MDD techniques supported by IBM Rational Rhapsody, you can analyze trade studies more rigorously than is possible with a document-driven approach.
Tags : 
system engineering, trade studies, ibm, design space, life cycle, traditional document-driven techniques, webcast, model-driven development (mdd), telelogic® rhapsody®, trade study analysis, system engineering process
    
IBM
Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
    
Reactivity
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi, email exploit, nimda, yaha, bugbear, exploit software, exploit engine, mailsecurity
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Published By: Interactive Intelligence     Published Date: Feb 27, 2013
In this white paper, learn about the advances in decision techniques that are at the center of contact center enterprise analytics. Learn how computers shouldn't replace people as decision makers, rather, aid us in decisions that are hard to make.
Tags : 
contact center, enterprise, analytics, advances in decision technologies, decision makers, strategies in decision cycles, computers ai, crm & customer care, marketing research
    
Interactive Intelligence
Published By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam, business threat
    
MessageLabs
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech
    
CopiaTECH
Published By: iProspect     Published Date: Jul 28, 2008
Learn the extent to which search marketing efforts are integrated with a variety of offline marketing channels and the specific search marketing and integration techniques in use, as well as how to identify obstacles to the integration process.
Tags : 
iprospect, jupiter, seo, search engine marketers, sem, search marketing agencies
    
iProspect
Published By: Oliver Wight     Published Date: Jun 23, 2008
Even if a chosen business model establishes some preference for one technique over another, at different points in the value chain, different techniques may be appropriate to plan and manage the demand, the production activities, the resources, and the supply of materials. Knowing when and where to apply each of the different techniques is critical.
Tags : 
erp, productivity, bpm, business management, planning, business model, oliver wight
    
Oliver Wight
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
Most project resources perform work and include such entities as personnel, equipment and contractors. However, the concept of a resource (and the techniques of resource management presented in this paper) can also be applied to entities that do not perform work, but which must be available in order for work to be performed.
Tags : 
workforce, personnel, employee, project success, psi
    
Project Success, Inc.
Published By: Marketo     Published Date: Jul 30, 2013
Today's fastest growing companies are using repeatable marketing and sales 2.0 techniques to grow revenue predictably and reliably. Download this white paper and learn why companies that implement a marketing automation system to support their marketing and sales efforts are better equippedto manage lead flow and process leads more efficiently.
Tags : 
marketo, marketing, marketing automation, roi, lead flow, sales techniques, whitepaper, crm solutions/software, business intelligence, market research, lead generation & automation
    
Marketo
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.