keys

Results 126 - 150 of 191Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Symantec CloudSOC Cloud Data Protection allows enterprises to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle. Stay agile, competitive and compliant with the freedom to move sensitive or regulated information to the cloud while retaining physical ownership of encryption keys /token vaults.
Tags : 
cloud data protection, data protection, security, encryption, security infrastructure
    
Symantec
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware, security, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
In this white paper, we measure how end users of Enterprise Resource Planning (ERP) applications describe the impact of Microsoft and SAP applications on their business productivity. This research found that Microsoft Dynamics end users on average rated their experience with Microsoft applications more favorably than SAP users rated their experience with SAP.
Tags : 
sap, microsoft, erp, enterprise resource planning, keystone, microsoft dynamics, productivity, business activity, efficiency, enterprise software, bpm, collaboration, survey, platforms
    
Microsoft Dynamics
Published By: Vocus, Inc     Published Date: Dec 16, 2008
Evaluate your current PR program to help you develop a plan that will reach your goals and objectives, while delivering value to the business.  Learn the four keys you need to plan for strong, focused and successful PR in 2009.
Tags : 
vocus, pr program, public relations, successful pr, pr 2009
    
Vocus, Inc
Published By: WebiMax     Published Date: Nov 25, 2009
It may be easily understood SEO can immensely help marketing efforts, yet with so many providers available, the process of deciding upon a service can be confusing. First, it is important to understand what search engine optimization is and what it can do for your company. Basically, SEO providers employ a number of tactics to gain positive momentum for your Web site on the search engines. Using specific, germane words and phrases related to a site's goods and services, an SEO service helps to make the site widely recognized by consumers and attract more revenue.
Tags : 
webimax, seo, search engine optimization, optimized, service provider
    
WebiMax
Published By: SAS     Published Date: Feb 29, 2012
In this white paper, Ian Henderson of Sword Ciboodle and Retha Keyser of SAS describe what that ideal can look like and how to achieve it.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
    
Symantec
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation, security, it management, business technology
    
IBM
Published By: IBM     Published Date: Oct 15, 2013
Discover the four key dimensions to personalized web marketing, and learn from the real life successes of enterprises that have made the personalized web a core part of their growth strategies.As you can see, web marketing can achieve comparable success when you make the four personalization steps your own.
Tags : 
ibm unica, click-throughs, personalizing web experience, customer needs, data sources, specific site analyses, across channels, sales and marketing opportunities, online and offline, customer interests, website traffic, referring sites, referring keywords, ibm smarter commerce
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security, it management
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value, security, it management
    
IBM
Published By: TreeHouse Interactive     Published Date: Jul 27, 2010
This quick guide-written by marketing automation expert Ardath Albee details practical strategies and tactics to use in retaining customers.
Tags : 
treehouse, marketing automation, b2b, b2c, branding, objectives, nurturing, channel relationships
    
TreeHouse Interactive
Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, accounting, payroll, servers, network
    
Comcast Business
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shopkeepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, marketing opportunity, business technology
    
IBM
Published By: Introhive     Published Date: Sep 24, 2013
Connections exist throughout your entire organization. These connections can be leveraged with warm introductions to eliminate the need for cold calling into those key prospects and accounts. Download this white paper to discover how your relationship capital can increase ROI.
Tags : 
relationship capital, increasing roi, closing deals, sales
    
Introhive
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shop-keepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, business technology
    
IBM
Published By: Polycom     Published Date: Jan 06, 2015
This document will outline five easy steps to create awareness, increase utilization and expedite adoption of video collaboration across your organization. You’ve recently added video to your communications environment. Now the real challenge begins –getting your company to actually use the solution. What is the best way to launch and promote video collaboration internally? Which departments or groups should you be targeting? What are the keys to maximizing usage levels? What are the major concerns surrounding video, and how do you overcome them?
Tags : 
train, video, network, telecommuting, mobility, on-demand webinar, polycom, collaboration, guide, networking, it management, knowledge management, enterprise applications, data management, human resource technology
    
Polycom
Published By: Bronto     Published Date: Jul 16, 2012
Transactional messages are the most opened among message types. Find out the keys that will let you take advantage of this and drive more revenue from your transactional messages.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer
    
Bronto
Published By: Business.com     Published Date: Jun 03, 2009
Learn the 9 keys to improving the quality of your leads from your B2B search marketing efforts - simply and effectively - with this Business.com whitepaper. Download to learn more today!
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com