target

Results 201 - 225 of 1015Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: ClearSlide, Inc     Published Date: Feb 25, 2015
Organizations treat customer data as a key component of CRM. Many organizations see an effective customer data management strategy as an important cornerstone of their CRM strategy. Most organizations are moving beyond tactical CRM initiatives focused on saving cost and driving efficiency to making their organization more effective and focused on driving better customer engagement and experience. Customer data is used to enhance customer experiences, improve service quality, target marketing efforts, capture customer sentiment, increase upsell opportunities and trigger product and service innovation.
Tags : 
crm, big data, customer engagement, customer service, emerging marketing, crm & customer care, marketing research
    
ClearSlide, Inc
Published By: Clearswift     Published Date: Jun 09, 2008
This short guide summarizes ten steps to web security. Do them all, and you'll be better protected than 98% of enterprises out there. But the target never stands still. More than the steps listed here, it's important to focus on the principles behind the steps, including: policy, vigilance, simplification, automation and transparency.
Tags : 
clearswift, web security, internet security
    
Clearswift
Published By: Clicktale     Published Date: Jul 06, 2015
Learn how to choose the best format for your content that will best meet your target audience's needs. Discover why and when visitors tend to prefer video over text and vice versa. Leverage these insights to increase engagement.
Tags : 
text, video, content, engagement, website, content optimization, content delivery, content marketing
    
Clicktale
Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control
    
CloudFlare
Published By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics
    
Clustrix
Published By: Clustrix     Published Date: Oct 08, 2013
This whitepaper outlines new database technologies that are helping advertisers remove bottlenecks that slow down applications, improve functions such as ad segmentation and targeting based on up to the minute campaign performance and give agency clients instant access to smart data.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics, smart data, applications
    
Clustrix
Published By: CMO.com     Published Date: Mar 16, 2017
New analysis by the Adobe Digital Insights (ADI) team reveals some noteworthy shifts in the mobile landscape. The first: Tablets have failed to make a real comeback, despite strong holiday discounting in the United States. Additionally, Google Accelerated Mobile Pages (AMP) is catching on in the United States, where internet saturation is turning the mobile space into a fearsome battleground.
Tags : 
amp, adobe digital insights, adi, mobile, tablet, amp
    
CMO.com
Published By: Cohesity     Published Date: Apr 24, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Oct 02, 2018
Until recently, Manhattan Associates had used a traditional secondary storage solution to manage its large and rapidly expanding data footprint of ~1PB. Designed for traditional workflows, the company’s IT team realized it had become cost prohibitive to add features to their existing environment to support their VM level backups. Like most traditional storage options, the existing solution did not scale-out linearly, and complicated the environment by creating silos. With Cohesity’s scale-out architecture, the team was able to start small and grow their Cohesity environment on the go, yet keep it unified and simple. See how Manhanttan Associates achieved operational efficiency and lowered their TCO by supporting VM data protection, supporting native integration with the public cloud and providing simple converged solution for data protection, target storage and files. Get the case study.
Tags : 
case, study, manhattan, associates, consolidates, data, protection
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 26, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year. Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers, your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
Best practices to prevent, detect, and respond to a ransomware attack targeting your backups
Tags : 
    
Cohesity
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
    
Collaborative Consulting
Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
    
Computhink
Published By: Conductor     Published Date: May 29, 2013
Standard practice for most marketers is to target the largest possible addressable audience with their product or service. Go to where the eyeballs are -or so the logic goes.
Tags : 
conductor, seo, marketing, long-tail terms, marketing 101, search marketing
    
Conductor
Published By: ConnectWise     Published Date: Aug 22, 2019
Switching to a managed services model where clients pay you a fixed monthly rate to manage their entire IT infrastructure. If done correctly, this transition can be a lifeline to reliable revenue in a shifting market. Making the transition from an unsteady break-fix model to a proactive managed services model will require a systematic plan with well-thought-out steps that range from understanding your target market to implementing essential automation. If you’re considering becoming a managed service provider (MSP), these six steps can help. As you read through them, keep in mind that the best strategy is to have a strategy.
Tags : 
    
ConnectWise
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"Still thinking of employee learning and business needs as separate – or competing – entities? Your employees want targeted training that’s ready when they are, and they also want to be rewarded for developing new skills. Companies also want to provide learning, but only if it shows results at the lowest possible cost. In fact, 59% of employees said that access to projects to help keep their skills up-to-date would keep them satisfied at their current company. So how do you reconcile the two? Download this brief to learn ‘3 Ways to Tie Learning Directly Into Business Needs.’ "
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"A learning management system (LMS) is designed to do more than “check the box” on training. It’s also a powerful platform ready to deliver meaningful, targeted education and engage workers with career development opportunities. Importantly, an LMS can help your company increase the ROI of employee training and learning. Download our quick-read guide on how an LMS can: 1. reduce costs and inefficiencies by streamlining the delivery of learning 2. reduce hiring and turnover costs by retaining high performers 3. increase new hire engagement and productivity by integrating ongoing learning with onboarding 4. drive unified success by aligning employee and organizational goals 5. reduce cost of administering compliance training"
Tags : 
    
Cornerstone OnDemand
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.