activity management

Results 1 - 25 of 33Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
    
Alight Solutions
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure
    
Avocent
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Published By: Certent UK     Published Date: Apr 25, 2018
In organizations where internal reporting is done manually, it can feel much more like a chore than a critical, strategic activity. Read this report to find out how much of a difference an insight-led approach can make when the finance team has time to analyze the figures and provide meaningful insight for senior management.
Tags : 
    
Certent UK
Published By: Cranfield University     Published Date: Apr 01, 2015
Marketing value metrics enable marketers to measure the impact of marketing activity against organisational goals more effectively and empowers marketing teams and their leaders to justify and defend their plans to their CEOs and CFOs. The model presented in this free chapter has been developed by Professor Stan Maklan, Dr Stan Maklan and Peter Mouncey from the renowned Cranfield School of Management and provide a metrics-based framework for developing and implementing marketing strategies that are measurable and accountable.
Tags : 
marketing value metrics, marketing metrics model, business goals and marketing, measuring marketing effectiveness, emerging marketing, business intelligence, market research, traditional marketing, sales
    
Cranfield University
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Published By: HotSchedules     Published Date: Jan 17, 2019
Restaurant inventory management is not a favorite activity among restaurant managers, but that doesn’t mean it has to be painful. The process — especially when conducted with outdated methods — is both tedious and time-consuming. But better inventory management could have a big impact on your restaurant’s bottom line. This infographic tells you how to handle objections from managers who don’t want to your inventory management system and lays out how to fix the problem with modern, mobile inventory tools.
Tags : 
    
HotSchedules
Published By: IBM     Published Date: Jul 10, 2009
There has never been a more important time to uncover process waste, reduce non-value adding activity, and increase productivity. Lean Six Sigma (LSS) produces real results, and when combined with business process management (BPM) and service oriented architecture (SOA) can position a company for growth as the economy begins to improve.
Tags : 
six sigma, lean, bpm, soa, lss, lean six sigma, service oriented architecture, business process management
    
IBM
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight
    
IBM
Published By: IBM Unica     Published Date: Sep 08, 2011
This SiriusDecisions vendor profile features Unica, which offers a marketing automation platform that includes online and offline campaign management, Website and content personalization, activity-based campaign triggers, lead management, and customer data and Web analytics.
Tags : 
ibm, unica, siriusdecisions, vendor profile, field marketing, automation platforms, integrated enterprise, demand creation provider grid, interactive marketing, web analytics, business intelligence, market research, data management/analytics
    
IBM Unica
Published By: LandslideCRM     Published Date: May 16, 2012
This whitepaper chronicles Boston Mutual Life Insurance Company, the first sales organization to embark on CRM 3.0, bypassing CRM 2.0, representing a paradigm shift in strategy, people, and technology management. We outline how this bridged approach was achieved and how your organization can do the same.
Tags : 
crm demo, crm solution, crm software, account management, contact management, opportunity management, deal management, lead management, mobile crm, social crm, crm dashboard, crm reporting, sales forecasting, email marketing, web conferece, task management, activity management, sales activity, sales library, resource library
    
LandslideCRM
Published By: LandslideCRM     Published Date: May 16, 2012
This whitepaper discusses the key reasons why traditional CRMs have failed to see 'voluntary' adoption by sales teams and the details of the Sales production System approach that removes this adoption hurdle.
Tags : 
crm demo, crm solution, crm software, account management, contact management, opportunity management, deal management, lead management, mobile crm, social crm, crm dashboard, crm reporting, sales forecasting, email marketing, web conferece, task management, activity management, sales activity, sales library, resource library
    
LandslideCRM
Published By: LandslideCRM     Published Date: May 16, 2012
This concise Sales Process Builder Kit will provide you with relevant content from leading sales experts that highlight the direct value your sales team can get by following a consistent sales process.
Tags : 
crm demo, crm solution, crm software, account management, contact management, opportunity management, deal management, lead management, mobile crm, social crm, crm dashboard, crm reporting, sales forecasting, email marketing, web conferece, task management, activity management, sales activity, sales library, resource library
    
LandslideCRM
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
Customer service has evolved from a reactive activity viewed largely as a cost center-based tactical necessity, to a proactive management task that can in many ways set a company apart from the competition. At the same time, the channels by which customers receive support are growing and fragmenting very rapidly. The telephone is still the primary mode of support, but is steadily declining as text, social media, chat, knowledge bases, email and online communities provide new avenues for customers to get the help they need. Some organizations are embracing this evolution by implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals.
Tags : 
logmein, infoworld, customer service, customer support, support, support strategy, social media, mobile support, email support, remote pc access software, remote desktop connection, remote computer support, customer support channels
    
LogMeIn Rescue
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Accor is one of the world's largest travel, tourism and corporate services companies. With over 4,000 hotels worldwide, Accor Hotels covers all segments from economy to upscale. Sofitel, Novotel and Motel 6 are just a few of Accor's hotel brands. Accor's online relationship marketing strategy aims to convert prospects into customers and build customer value through increasing the depth of relationships and growing revenues from repeat bookings, cross-sales, up-sales and referrals.
Tags : 
neolane, accor hotels, online relationship marketing strategy, improve reactivity rates, campaign personalization, collaborative content management, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media, interactive marketing
    
Neolane, Inc.
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
By creating a connected field service ecosystem, organizations can increase their response time, reduce mean time-to-resolution and eventually, power a more predictive service model. This will enable a new level of field service productivity and cost-savings from increased efficiencies. Organizations will also be able to provide exceptional customer experiences consistently. Customer disruption and asset downtime will be minimized, and organizations will be able to empower their field service resources with insight into the issue before they arrive at the customer site. All thanks to a unified field service and IoT strategy.
Tags : 
internet of things, iot, daily activity, industry innovation, field service, organization management, device efficiency, telecommunications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle OMC     Published Date: Nov 30, 2017
Lead nurturing is about helping buyers along in their educational journey. Thus, it’s most effective when triggered by prospect activity or behaviors. Lead management technologies are often used to automate such real-time marketing. This type of software makes it possible to track leads and automate content delivery while simultaneously collecting behavioral data and triggering corresponding actions.
Tags : 
    
Oracle OMC
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.