worldwide

Results 351 - 375 of 410Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Sep 10, 2013
This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of many client virtualization software vendors.
Tags : 
citrix, xendesktop, virtualization, virtual desktop, idc study, virtualization software, independent research
    
Citrix
Published By: Oracle     Published Date: Nov 05, 2013
This survey based whitepaper, based on interviews with 229 executives worldwide assesses the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and incentive compensation plans. This is critical in response to emerging market opportunities and complex global economic challenges.
Tags : 
creating sales territory, sales performance, sales plan development, sales data, sales territory, incentive compensation plan, enterprise communications, data versus instinct, data management/analytics, sales
    
Oracle
Published By: Cisco     Published Date: Jan 05, 2015
This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.
Tags : 
mobile, video collaboration, portfolios, investments, unified communications
    
Cisco
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security
    
Palo Alto Networks
Published By: HP     Published Date: Aug 26, 2014
HP Simply StoreIT takes the stress out of storage. HP and our network of over 200,000 channel partners worldwide can help you choose the right solutions to fit your biggest business challenges. We can help you overcome obstacles including too little time for managing IT, budgets for upgrading infrastructure, and too many business risks and threats. Now you can take charge of virtualization, storage for business solutions such as Exchange and SQL Server, growing file shares, and data protection for business continuity. Improve your operational efficiency, reduce your risks, and lower storage costs. See how.
Tags : 
storage, budgets, server, virtualization, file, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork
    
HP
Published By: SmartFocus     Published Date: Apr 22, 2015
With 1.75 billion people worldwide owning a smartphone, your customer will now have constant connectivity. Therefore to be successful in your marketing campaigns, it is vital to understand the mobile user experience and ensure all parts of your campaign are mobile optimized. Don’t do this and you could reduce customer engagement and even worse, loose your best customers to your competitors. Our easy to implement mobile marketing tips can help add value to your campaigns and give you the edge.
Tags : 
mobile marketing, personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns, email marketing, emerging marketing, social media, internet marketing, crm & customer care, e-commerce, traditional marketing, sales
    
SmartFocus
Published By: VMware AirWatch     Published Date: Mar 02, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
    
VMware AirWatch
Published By: Ring Central     Published Date: Mar 21, 2016
Gartner Inc., the world’s leading information technology research and advisory firm, has positioned RingCentral in the Leaders Quadrant of the 2015 report, Magic Quadrant for Unified Communications as a Service (UCaaS), Worldwide,* as a result of its ability to execute and the completeness of vision.
Tags : 
ring central, gartner, unified communications, cloud, phone systems
    
Ring Central
Published By: VMware     Published Date: Feb 24, 2017
The enterprise mobility management (EMM) software market continues to grow, and VMware AirWatch® accounts for 16.5 percent of the total EMM software market, the largest market share of any vendor today. IDC calls AirWatch a “top-tier vendor” with a “phenomenal growth rate,” increasing market share from 11.4 percent in 2014 to 16.5 percent in 2015.
Tags : 
    
VMware
Published By: IBM     Published Date: Oct 24, 2013
The Dow Chemical Company is a $60 billion enterprise composed of a worldwide network of 13 business units. Although such a decentralized business structure has competitive advantages, it can also create challenges to setting and achieving enterprise-wide goals.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb, compliance
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
According to a 2012 Ipsos/Reuters poll, one in five employees worldwide now work from home. In another study, two-thirds of those who responded said they, expect their workplace to go fully virtual within the next few years. This IBM whitepaper analyzes the reasons for this shift in the workplace, and its implications for the facilities management of your company. Learn how to manage the growing number of empty real estate inside your company in a smarter fashion, so that your company runs more efficiently, and cuts down on unnecessary costs.
Tags : 
smarter building, facilities management, changing workforce, mobile workforce, distributed workforce, real estate, energy management
    
IBM
Published By: OSM Worldwide     Published Date: Sep 13, 2017
Making small changes in shipping can offer a range of beneficial opportunities. Working with a true shipping partner can improve efficiencies and lower your cost — all while increasing your customers’ overall satisfaction. Explore our white paper and learn: • How modifying your shopping cart functionality can enhance your customers’ experience • Why even small adjustments in packaging can have large cost implications • The best ways to improve final-mile delivery
Tags : 
domestic shipping, nationwide shipping, worldwide shipping, international shipping, shipping services, optimize shipping, efficient shipping, reduce shipping costs, improve shipping logistics, improve shipping delivery, improve shipping efficiency, cost-efficient shipping
    
OSM Worldwide
Published By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats
    
IBM
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl
    
Symantec
Published By: Oracle     Published Date: Sep 30, 2014
"Consumers worldwide have nearly 5 billion active mobile subscriptions- that’s almost a billion and a half more active mobile subscriptions than toothbrushes sold. With more than five times more mobile devices than PCs on the planet today, as a marketer, chances are your messages are being consumed in the mobile channel. If you’re not aligning your strategies with this new reality, you may find your business headed the way of the landline."
Tags : 
oracle, marketing, cloud, connected, customer, modern, growing, mobile, subscriptions, crm & customer care, sales
    
Oracle
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: AdRoll     Published Date: Jan 21, 2016
Key findings on the trends and benefits of retargeting on the world’s largest social network. Retargeting on Facebook has become an indispensable tool for digital advertisers. In our Facebook by the Numbers 2015 research report, we analyze AdRoll Retargeting campaign data across our global customer base. The findings in this report summarize our in-depth, yearlong review of over 55,000 campaigns, which served a staggering 37 billion impressions worldwide.
Tags : 
adroll, facebook, retargeting, advertiser spend, campaign data, digital advertising, emerging marketing, social media, internet marketing, marketing research
    
AdRoll
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail, ssl vpn
    
Aventail
Published By: iDirect     Published Date: Aug 21, 2009
The global demand for voice and data services delivered over cellular networks continues to grow as new markets open and existing ones increase capacity. The networking infrastructure to support subscriber growth and new services have experienced aggressive expansion as the worldwide economy evolves.
Tags : 
infrastructure, gsm, cellular, telecom, telecommunications, networking infrastructure, network expansion, voice services, data services, idirect
    
iDirect
Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, outside sap
    
Ultimus
Published By: Asentria Corporation     Published Date: Sep 04, 2007
As an equipment provider for worldwide, national and regional radio and television facilities, Transcom Corporation, headquartered in Huntingdon Valley, Pa., has been meeting the broadcasting capability needs of stations worldwide since 1978. Transcom specializes in distributing new TV transmitters, antenna, cable, Studio Transmitter Link (STL) and audio equipment that enable television and radio stations to transmit sound and video from the studio to the antenna.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Clickatell     Published Date: May 20, 2008
To attract and retain customers, financial institutions today must be able to provide customers with real-time, reliable information about their bank accounts and transactions, no matter where they are located. Anywhere access to actionable account information helps customers control their finances, fight fraud, and conduct their lives more efficiently.
Tags : 
clickatell, location based services, mobile marketing
    
Clickatell
Published By: Lawson     Published Date: Jun 23, 2008
Get your free copy of the Thought Leadership Report “Strategic Asset Management Across the Organization Delivers a Compelling Return." Based on the findings of the 2006/7 Worldwide Benchmark Study, by industry analysts IDL, it identifies the changing attitudes and needs in the asset intensive industry.
Tags : 
asset management, lawson, erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml, pocket pc, sender policy framework (spf), sender id
    
Alt-N Technologies
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.