cloud

Results 5651 - 5675 of 6337Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 30, 2014
"Organisations are striving to deliver consistent experiences but very few feel they are there yet. -A mere 8% of respondents were able to boast that all their data and marketing systems were integrated. -Only 40% of marketers in the study were able to track the customer journey across channels."
Tags : 
oracle, marketing, cloud, connected, customer, modern
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
This commissioned study, conducted by Forrester Consulting on behalf of Oracle Responsys, analyzed the habits of 200 marketers to assess the impact on their brands ability to meet, or even anticipate, rapid changes in individual customer behavior. Read the report now.
Tags : 
oracle, marketing, cloud, connected, customer, modern
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
Mobile devices are transforming how we interact with each other and the world. Tapping mobile potential doesn’t have to take sorcery. Don’t let your efforts to keep up create a fragmented customer experience. You need an orchestrated way to plan, respond, and thrive in the new mobile marketing world. Read how.
Tags : 
oracle, marketing, cloud, connected, customer, modern
    
Oracle
Published By: Oracle     Published Date: Dec 11, 2014
"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”
Tags : 
oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation, networking, software development, it management, knowledge management, enterprise applications, data management, human resource technology, business technology
    
Oracle
Published By: Vocalocity     Published Date: Aug 24, 2011
Vocalocity, a leader in hosted communications platforms, has partnered with Cisco to deliver an agile, cost-effective, technologically innovative phone solution.
Tags : 
vocalocityr⪚, cisco, hosted pbx, telephony, small businesses, cost savings opportunities, cloud-based communications platforms, functionality, hosted communications platforms, phone solution, business agility
    
Vocalocity
Published By: Thawte     Published Date: Nov 08, 2011
Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage, cloud security, cloud solutions, geotrust, geo trust, geotrust.com, verisign; verisign.com, verisign inc, symantec, symantec.com, symantec corporation
    
Thawte
Published By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
web security, web threats, ssl, secure sockets layer, technology, solution, security, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
    
GeoTrust
Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications, security, business technology
    
Symantec
Published By: Symantec     Published Date: Oct 12, 2012
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions.
Tags : 
ssl certificates, cloud hosting, cloud services, encryption, authentication, certificate validation, secure sockets layer, it security, security, business technology
    
Symantec
Published By: Salesforce.com     Published Date: Sep 16, 2014
Dreamforce is four high-energy days of innovation, fun, and giving back. It’s your chance to learn from industry visionaries, product experts, and world leaders who can help you transform your business and your life.
Tags : 
dreamforce, salesforce, conference, expo, free pass, cloud solution, crm, cloud, keynote speakers
    
Salesforce.com
Published By: Salesforce.com     Published Date: Sep 16, 2014
Dreamforce is four high-energy days of innovation, fun, and giving back. It’s your chance to learn from industry visionaries, product experts, and world leaders who can help you transform your business and your life.
Tags : 
dreamforce, salesforce, conference, expo, free pass, cloud solution, crm, cloud, keynote speakers
    
Salesforce.com
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to confidently choose a cloud hosting provider and see how your organization can take advantage of the economic benefits, but also avoid potential security risks.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Dec 23, 2014
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs.
Tags : 
cloud-based, code, enterprise, symantec, apps, secure app service, security, software development
    
Symantec Corporation
Published By: Symantec     Published Date: Nov 04, 2013
Security and the Cloud, A perfect match for Your Small Business.
Tags : 
symantec, security, cloud, cloud computing, security and the cloud, small business, smb, software development, it management
    
Symantec
Published By: Symantec     Published Date: Nov 04, 2013
SMBs are moving ahead and fully engaging with cloud computing. In fact, Symantec’s 2013 Avoiding the Hidden Costs of the Cloud survey reveals that four in five are now involved in discussing or implementing the cloud.
Tags : 
symantec, smbs, rerez research, cloud survey, cloud security, cloud computing, security, software development, it management
    
Symantec
Published By: Avalara     Published Date: May 06, 2015
This report uncovers the direct and indirect costs of managing sales and use tax compliance that your organization may be experiencing and provides a strategy for reducing these costs through cloud software.
Tags : 
finance, tax. compliance, sales tax, strategy, accounting
    
Avalara
Published By: Avalara     Published Date: Jul 17, 2015
This report uncovers the direct and indirect costs of managing sales and use tax compliance that your organization may be experiencing and provides a strategy for reducing these costs through cloud software.
Tags : 
cloud computing, tax management, process, strategies
    
Avalara
Published By: Avalara     Published Date: Aug 10, 2015
This report uncovers the direct and indirect costs of managing sales and use tax compliance that your organization may be experiencing and provides a strategy for reducing these costs through cloud software.
Tags : 
compliance management, hidden costs, best practices, automating tax management strategies, financial management, tax regulation, cloud solution, sales compliance
    
Avalara
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : 
ldap, active directory, user management, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity management, sso, configure ldap, aws, cloud servers, iaas, user directory, it management, knowledge management, enterprise applications, business technology
    
JumpCloud
Published By: IBM     Published Date: Feb 18, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile app testing, ibm, desktop applications, mobile test environments, mobile device cloud, it management, knowledge management, enterprise applications
    
IBM
Start   Previous    220 221 222 223 224 225 226 227 228 229 230 231 232 233 234    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com