activity

Results 276 - 300 of 349Sort Results By: Published Date | Title | Company Name
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Workfront     Published Date: Nov 17, 2015
How will ensure your marketing initiatives’ success in 2016? Join us for a TED-style webinar on Wednesday, December 16, at 1:00 p.m. ET, with marketing thought leaders Ann Handley, Jay Baer, Joe Staples, and Mark Schaefer as they provide forward-looking recommendations on how marketing managers and executives can confront and overcome the challenges of the coming year. How your marketing team works is as important as what they’re working on. The winners in 2016 will be those teams who optimize their team’s work processes and tools for maximum creativity, efficiency, and reactivity. This webinar promises tips and tricks on how to build this kind of high-performing marketing team, including: • How to better plan, prioritize, and manage your work for a successful 2016 • Trends that impact the way marketers work and their ability to succeed • How to manage your teams to understand the full scope of work and make data-driven decisions
Tags : 
    
Workfront
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec
Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
    
Symantec
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize, security
    
Cisco
Published By: Riverbed     Published Date: Jul 15, 2014
The true litmus test of a valuable network analysis tool is its ability to provide information, quickly and easily. Riverbed Cascade® Pilot does this and so much more!
Tags : 
cascade, network analyst, valuable, information, quickly, easily, proactivity, business technology
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
In January 2012, Riverbed® Technology announced version 9.5 of its Cascade® network performance management solution, which included a number of major enhancements. Collectively, the new capabilities are designed to improve visibility into the health and activity of applications and services traversing networks from the branch to the data center.
Tags : 
advnace, visibility, virtual data centers, technology, solution, management
    
Riverbed
Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping, security, business technology
    
distilnetworks
Published By: SmartFocus     Published Date: May 27, 2015
Your customer wants a personalized and relevant experience, with every interaction, tailored around THEIR location, activity and device. Are you delivering that? In a recent webinar hosted by Forrester Research Inc and SmartFocus they discuss taking personalization to the next level with context-aware marketing - the emerging theme of 2015 that is changing the way we do marketing.
Tags : 
forrester, mobile, marketing, personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns.
    
SmartFocus
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security, security
    
Symantec
Published By: Bronto     Published Date: Aug 14, 2014
Sleigh bells ring, are you listening? Though the holidays might seem far away, leading retailers will start preparing for the holidays now. Whether you’ve kicked off your planning or you haven’t even started, there are several ways to ensure that the 2014 holiday season is stellar. To help you and your team have a successful holiday season, this white paper offers some helpful tips for the holiday season, to ensure you make changes well ahead of the chaotic blizzard of activity that wraps up the end of the year.
Tags : 
marketing tips, holiday marketing, email production, holiday promotions
    
Bronto
Published By: Business.com     Published Date: Jul 20, 2009
Not long ago, search marketing and branding were viewed as two entirely different aspects of the marketing mix. Like oil and water, they didn't mix. In reality, brand building and search marketing are inextricably linked and actually tend to drive better overall marketing ROI when working together. Get the 5 simple but effective tips to build B2B brands with search marketing.
Tags : 
b2b, business.com, brand, search marketing, branding, roi, marketing mix, seo, search engine optimization, ctr, business-to-business, online search activity, budget, media plan, ppc, serp, branded, generic, ppc
    
Business.com
Published By: GeoTrust     Published Date: Jan 17, 2014
Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more
Tags : 
web analytics, tracking, e-commerce, optimization, web site, geotrust true, geotrust, ssl certificates, bit encryption, web security, ssl security, ssl provider, certificate authority, bit encryption
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
Tags : 
web analytics, e-commerce, tract activity, web site optimization, metrics, encourage customers
    
GeoTrust
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide provides a number of helpful tips for an effective evaluation of campaign activity, including: • How to distinguish between measurement types • An in-depth view on campaign measurement frameworks and dashboards • Common campaign objectives
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns, social media management
    
Brandwatch
Published By: LiveHive     Published Date: Feb 16, 2016
Best selling author and sales expert Jill Konrath breaks down productivity hacks to getting more done in less time. Jill will look at different methods to help you eliminate the distractions that don’t contribute to your sales goals, tame procrastination and master the art of motivation, and employ the right tools to automate work and focus your efforts on meaningful activity.
Tags : 
sales process, livehive, productivity hacks, ebook, best practices
    
LiveHive
Published By: AdRoll     Published Date: Jul 11, 2017
Nothing is more top of mind for marketers than attribution. It’s a complex topic, and there are lots of questions. Should you measure only the first click, or the last click? Should you also measure views? Should you combine view measurement with click measurement? How long should you wait to give credit to user activity? In this whitepaper, we examine the history of attribution models and dive deep into AdRoll platform data, third-party research, and advertiser survey data to make the case for marketers to adopt a blended attribution model, one that combines both ad views and clicks. Attribution is critical to marketing success because nothing has a bigger influence on evaluating results than how you measure the impact of your advertising. And in the digital paradigm, almost everything is measurable. When we surveyed our customers, we heard this point loud and clear. Of the 1,050 marketers we spoke to in our 2016 State of the Industry Report, 84% believe attribution is critical or ver
Tags : 
attribution, adroll, performance marketing, advertising
    
AdRoll
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity, loyalty
    
Informatica
Published By: eROI     Published Date: Jan 23, 2007
Your customers are the most important aspect in your business - without them, you have nothing. eROI offers communication advice that can help you to maximize customer satisfaction and loyalty. Topics discussed include loyalty offers, low activity offers, surveys, and more.
Tags : 
lead generation, email marketing, newsletter design, loyalty and retention, content personalization, re-engagement, re-enticement, low activity
    
eROI
Published By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.