• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

products

Results 1 - 25 of 1288Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA
By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
By: Bluecore     Published Date: May 07, 2019
Personalization runs through every retail interaction, and it has the potential to make or break consumers’ relationship with your brand. But we don’t need to tell you about the importance of personalization. What we do need to talk about is how to get it right. And why email is the best place to start. Creating a personalized experience in the league of retail pacesetters like Stitch Fix and Sephora is all about bringing together an intimate knowledge of both your customers and your products. This eBook explores what it takes to make that happen, including how to parness product data for retail personalization, what truly relevant experiences look like and how to remove common technology roadblocks to achieving retail relevance.
Tags : 
    
Bluecore
By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
    
Recorded Future
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jul 29, 2008
Aligning IT and business perspectives requires the ability to create links between configuration information in the CMDB and the business service as experienced by the user. Service Dependency Mapping (SDM) products automate the process of creating and maintaining these links.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, business activity monitoring, business analytics, business integration, business intelligence
    
ASG Software Solutions
By: Sitecore     Published Date: Aug 05, 2009
Organizations see Web content management as a pivotal solution component in driving new business value. Use this Magic Quadrant to understand the fresh vitality in the WCM market and how Gartner rates the leading vendors and their packaged products.
Tags : 
gartner, magic quadrant, web content management, wcm, marketscope
    
Sitecore
By: Virtuant Corp.     Published Date: Oct 29, 2011
A benchmark report to provide IT decision makers with a fair comparison of two of the most popular application server products on the market today.
Tags : 
    
Virtuant Corp.
By: Precision Fiber Products     Published Date: Sep 19, 2012
Global Supplier of quality fiber optic products: PM connectors, optical attenuators, adapters, ferrules, MIC patch cords & cable assemblies, polishing film, fixtures, Miller tool kits & more.
Tags : 
    
Precision Fiber Products
By: LSSiDATA     Published Date: Feb 05, 2010
New movers are ideal targets for Direct Marketers. New homeowners and renters invariably purchase a wide range of products and services. According to moving.com "People who are moving spend more during the 3 months surrounding their move than non-movers spend in 5 years."
Tags : 
lssidata, data, direct marketers, marketing, super consumers, new mover, clv, clec, firstconnex, line
    
LSSiDATA
By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management, data protection, content management system
    
Astaro
By: Wheelhouse Enterprises     Published Date: Jul 14, 2010
Quickly see differences between brands like Avaya, Mitel, Cisco, ShoreTel, 8x8, Panasonic, etc and compare over 94 phone systems by 52 brands for small to big business. Our latest Spring 2010 edition of the chart also compares PBX and Business VoIP systems side by side so you can make an educated comparison of your options. This analysis is prepared in an easy to use Excel spreadsheet so you can edit and add information to suit your analysis and presentation needs.
Tags : 
compare, compare business products, wheelhouse, avaya, mitel, cisco, shoretel, 8x8, voip, pbx
    
Wheelhouse Enterprises
By: Microsoft Office 365     Published Date: Oct 14, 2016
Champion innovation through collaboration Win or lose? Jack Welch, former chairman and CEO of General Electric, said, "If the rate of change on the outside exceeds the rate of change on the inside, then the end is near." To win in today’s fast-paced market, you need to innovate. This eBook shows you how to transform your team and organization into one that is more agile and better equipped to innovate using a modern collaboration platform. A collaborative culture helps you: Widen the ideation pipeline Accelerate time to market Deliver higher quality products and new customer experiences Fill out the form to download the eBook to learn more about how to innovate with connected collaboration.
Tags : 
innovation, team organization, collaboration platform, market, culture
    
Microsoft Office 365
By: Microsoft Office 365     Published Date: Nov 03, 2016
Win or lose? Jack Welch, former chairman and CEO of General Electric, said, "If the rate of change on the outside exceeds the rate of change on the inside, then the end is near." You can transform your organization to be more agile and innovative through collaboration. A collaborative culture helps you: Widen the ideation pipeline Accelerate time to market Deliver higher quality products and new customer experiences Download this eBook to learn more.
Tags : 
    
Microsoft Office 365
By: Dell EMC     Published Date: Aug 23, 2018
“While 3D design tools have been around for a while, the consumerisation of VR is opening-up visualisation options at an unprecedented rate. Visualisation has evolved to a level that allows designers to produce photorealistic images of products in natural environments faster and with more accuracy, enabling even faster time-to-market and allowing customers to experience the product for themselves – and all without real-world prototyping and modelling costs. This guide is designed to give you an overview of the latest developments in visualisation and introduce our new VR Centres of Excellence in Limerick, Cork, Paris, Frankfurt, Dubai, Santa Clara or Austin, where you can experience the benefits for yourself.” Rahul Tikoo Executive Director and General Manager Dell Precision
Tags : 
    
Dell EMC
By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
By: Cisco     Published Date: Dec 20, 2018
Cisco® Collaboration Flex Plan gives you access to Cisco’s collaboration products, allowing you to mix and match buying models and deployment models in a single subscription depending on your buying needs. One subscription covers entitlement and technical support for: (a) the cloud services Cisco Webex® Meetings, Cisco Webex Calling, Cisco BroadCloud Calling, and Cisco Webex Teams and (b) the software Cisco Unified Communications Manager and Cisco Meeting Server.
Tags : 
    
Cisco
By: SAP     Published Date: Aug 14, 2018
Today, ERP is a cornerstone of many organisations’ tech infrastructure. Yet many of the solutions in play are legacy products, decades old and designed for an entirely different business landscape. With industry leaders expressing concern that out-of-date ERP solutions have now become an impediment to competitive business, IDC set out to uncover what exactly modern companies need from their ERP systems, and why SAP S/4Hana seems so well placed to deliver.
Tags : 
    
SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter