inbound

Results 1 - 25 of 92Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
IBM Sterling Secure File Transfer Demo - simplify and scale your file transfers Companies of all sizes in every industry are extremely reliant on file transfer as an essential infrastructure to power business. In fact, 55% of all systems integration is still done through file transfer.? IBM Sterling Secure File Transfer is a battle-tested platform that secures and simplifies scalable file-based transactions. In a single offering, you can: • Automate inbound and outbound file transfer across multiple protocols so you can partner with anyone, anywhere. • Handle your most demanding workloads with reliable, point-to-point file transfers. • Gain full end-to-end visibility and governance to help you meet your service level agreements. • Protect your brand reputation and comply with tightening regulations.
Tags : 
    
Group M_IBM Q4'19
Published By: Mimecast     Published Date: Oct 02, 2019
When it comes to securing email and protecting against cyberattacks, most organizations focus their attention and resources on inbound emails. Yet, only 40% of email originates through inbound system traffic. The other 60% of email traffic is introduced via internal-to-internal (40%) or outbound (20%) email communications. This E-book takes a close look at several email-related activities that employees often engage in that contribute to the spread of insider threats and discusses what measures organizations can take to protect themselves.
Tags : 
    
Mimecast
Published By: Oracle     Published Date: Sep 26, 2019
As marketers chase after the same people with the same tactics, traditional marketing has become less worth the time—and the money. Email outreach worked until spam clogged up inboxes. Content marketing worked until everybody started to put out sub-standard material. And search engine marketing worked until it became inundated with new players clamoring for attention. Even inbound tactics aren’t delivering the results they once did. And as the need for performance continues to climb, so does the status of account-based marketing (ABM). In the B2B sphere it’s on the tip of everyone’s tongue. Download this whitepaper to learn more about ABM, a potent approach that puts sales and marketing together.
Tags : 
    
Oracle
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you can’t see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what they’re doing. But visibility, by itself, isn’t enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrow’s threats, and SSL Orchestrator is the tool that lets your security controls keep your organization’s name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Seismic     Published Date: May 14, 2019
Sales enablement is quickly becoming one of the largest priorities for global, enterprise organizations. 37% of organizations consider sales enablement to be their top marketing priority over the next 12 months.* The impact is clear. Organizations that have undertaken a sales enablement initiative have seen a 350% increase in content usage and 65% more revenue generated by new reps. In this guide you'll learn everything you need to know about this emerging field including how organizations are using sales enablement to help supercharge their bottom line. *Hubspot’s 2018 State of Inbound
Tags : 
    
Seismic
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: Engagio     Published Date: Jan 14, 2019
B2B demand generation has almost completely re-invented itself over the last decade. The collision of inbound, content marketing, lead nurturing, marketing automation, analytics, email, search, social media and native advertising has transformed the discipline from a dark art to an increasingly data-driven science. But there’s a problem When it comes to helping to land and expand these major deals, today’s marketing teams are seriously handicapped. The Clear & Complete Guide to Account Based Marketing (ABM) is your guide to solving this problem. It will take you, step-by-step, through this fast-emerging discipline, showing you how to align your sales and marketing team around a strategy that’s optimized for the biggest, most important deals.
Tags : 
    
Engagio
Published By: Engagio     Published Date: Dec 18, 2018
B2B demand generation has almost completely re-invented itself over the last decade. The collision of inbound, content marketing, lead nurturing, marketing automation, analytics, email, search, social media and native advertising has transformed the discipline from a dark art to an increasingly data-driven science. But there’s a problem. When it comes to helping to land and expand these major deals, today’s marketing teams are seriously handicapped. The Clear & Complete Guide to Account Based Marketing (ABM) is your guide to solving this problem. It will take you, step-by-step, through this fast-emerging discipline, showing you how to align your sales and marketing team around a strategy that’s optimized for the biggest, most important deals.
Tags : 
    
Engagio
Published By: Box     Published Date: Jun 22, 2018
• There are many opportunities for businesses to introduce the concept of paper-free or less intensive paper processes to their organizations. AIIM 2016 Industry Watch research found that “58% of respondents described their inbound handling of content as ad-hoc”. This is not surprising given paper is still fairly dominant in many businesses due to human desire to keep paper in hand for reading, note taking, and still today, signatures. • In this study we take a look the challenges businesses face in relation to: o Digital Transformation of their business operations o Capturing and managing multi-channel inbound content, including paper o Steps taken to automate the information capture process o Use of analytics to enhance the identification and classification of capture information o A look ahead at the next 5 years to understand where businesses are focusing their efforts and funding
Tags : 
    
Box
Published By: Zebra Technologies     Published Date: May 02, 2018
By 2022, only 12 percent of warehouse operations will use pen and paper, according to a recent Zebra study. Why are manual processes vanishing? Because automation and connectivity enable the modern warehouse to stay compliant, deliver on time and ensure more overall customer satisfaction, every single time. You can create a more efficient, compliant and profitable warehouse. Learn how with our free eBook, 6 Steps to Flawless Fulfillment. You’ll discover actionable strategies to: Deploy industrial wireless solutions to optimize team productivity and workflow. Improve staff communications and management to maximize on-the-job efficiency and effectiveness. Streamline order picking processes to cut costs and save time. Create advanced inventory and storage capabilities to improve efficiency and accuracy. Upgrade inbound handling operations to process more shipments, more accurately. Turnaround outbound performance to deliver the ‘last mile’ in flawless fulfillment.
Tags : 
warehouse, operations, zebra, study, automation, customer
    
Zebra Technologies
Published By: Atlantic Broadband Business     Published Date: Apr 30, 2018
In order to maintain their commitment to customer service, Girard Toyota looked to upgrade their outdated phone system. The antiquated system they were using was not only costly to maintain, but also inhibited their efficiency — inbound calls were not answered in a timely fashion, and when they were, the hold times were much too long. Calls were not being transferred to the correct representatives, causing frustration for both new and existing customers. The entire customer experience was negatively impacted, threatening to cost the company revenue and its prized reputation for superior customer service.
Tags : 
girard, toyota, atlantic, broadband, business, solutions
    
Atlantic Broadband Business
Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services
Published By: Outreach.io     Published Date: Apr 09, 2018
In the world of sales, there are 3 types of reps: hunters, farmers, and dying. Most sales teams have realized that developing a group of reps who prospect for their own leads and build their own pipeline rather than simply following up on inbound leads and farming current customers for repeat orders is essential for driving growth. Order-taking farmer reps will get you only so far.
Tags : 
    
Outreach.io
Published By: Sigstr     Published Date: Oct 18, 2017
Businesses of all shapes, sizes and descriptions understand traditional, interruption marketing is now less efficient than ever. This awakening has powered the shift to inbound and content marketing, and the accompanying belief that "content is king." But here's the problem: If nobody can find the king, and most people distrust the king, are you still the king?
Tags : 
    
Sigstr
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: Uberflip     Published Date: Jan 09, 2017
Learn how the best B2B marketers create content for the entire buyer journey while avoiding content marketing flops.
Tags : 
content marketing, content creation, b2b content, b2b content marketing, inbound marketing, b2b blog, b2b ebook, content curation, content ideation, content marketplaces, content workflows
    
Uberflip
Published By: Uberflip     Published Date: Jan 09, 2017
A content marketer's job isn't done after hitting publish. Learn how the best B2B marketers effectively distribute their content.
Tags : 
content marketing, content distribution, b2b content distribution, demand generation, b2b demand generation, inbound marketing, email marketing, b2b email marketing, b2b social media, content syndication, b2b seo, search engine optimization
    
Uberflip
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: LeadGenius     Published Date: Sep 13, 2016
Do your B2B web forms capture all the qualifying data you need from inbound prospects? Neither do ours. That’s why we’ve compiled a PDF guide highlighting the best ways to get all the prospect data you need, without lengthening your forms.
Tags : 
b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations, account based strategy, ideal customer profile, icp, outbound, outbound email, inbound marketing, lead enrichment, customer data, lead form, emerging marketing, traditional marketing, sales
    
LeadGenius
Published By: Act-On     Published Date: Apr 29, 2016
Landing pages are the foundation that supports successful inbound marketing campaigns. Once you’ve done all the work of attracting visitors to your site, they’re the key to making the connection – and getting the conversion.
Tags : 
marketing, content marketing, best practices, business optimization, conversion, campaigns, internet marketing, traditional marketing
    
Act-On
Published By: Esker     Published Date: Dec 18, 2015
Those with document process automation solutions in place know the answer. Now, through this how-to guide, you can too.
Tags : 
esker, manual process, document automation
    
Esker
Published By: Cisco     Published Date: Dec 04, 2015
Gartner defines contact center infrastructure (CCI) as the products (equipment, software and services) needed to operate call centers for telephony support and contact centers for multichannel support. This type of infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, gartner, magic quadrant, contact center, infrastructure, telephony support
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
Infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, zk research, wifi, multigigabit network
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
Infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, magic quadrant, contact center infrastructure, worldwide, support center
    
Cisco
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.