web

Results 1 - 25 of 4121Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
Organised crime is joining athletes across the globe in training for the Games. And it's your corporate secrets that are up for grabs. In the past 6 months MessageLabs has intercepted 13 separate Olympic-themed Targeted Trojan attacks across several data-rich industries. With Targeted Trojans on the rise and able to evade conventional security mechanisms, MessageLabs is currently intercepting attacks that exploit the Olympics to appear authentic and attractive, but contain dangerous malware designed to steal corporate secrets.
Tags : messagelabs, olympics, secrets, spyware, virus, trojan, trojans, security, internet security, web security, anti spyware, anti virus, email security
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
At MessageLabs, we understand that deploying best practices in security means working with the people around you - and we'd like to help! Download this free pack of resources to help educate your employees about the latest threats and best practices around email and web security.
Tags : threats, threat, email security, web security, internet security, messagelabs, security, best practices
     MessageLabs Australia
By: Cisco EMEA     Published Date: Mar 08, 2019
The Cisco Meeting and TeamCollaborationExperienceThe workplace has changed and today themost agile workforces outperform traditional setups. But the reality of modern business life is, ifyou want a culture of innovation, you have tomake it yourself.Teams need a workplace thats focussed oninnovation and speed. Introducing Cisco WebexTeams, a platform that helps teams to do it all.Essential kit for forward-thinking smallbusinesses.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 08, 2019
The Cisco Meeting and Team Collaboration Experience The workplace has changed and today the most agile workforces outperform traditional set ups. But the reality of modern business life is, if you want a culture of innovation, you have to make it yourself. Teams need a workplace thats focussed on innovation and speed. Introducing Cisco Webex Teams, a platform that helps teams to do it all. Essential kit for forward-thinking small businesses.
Tags : 
     Cisco EMEA
By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product wasteand the need to rework faulty products. Watch this webinar to learn how TIBCOs Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
     TIBCO Software
By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no ones data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
     Rubrik EMEA
By: Emarsys - APAC     Published Date: Jun 12, 2019
Customer retention marketing aims to create engaged customers that return to a store or a website again and again. Its a major shift in focus that recognizes the value of marketing to your existing customer base rather than constantly trying to grow it. Retention and e-commerce marketing success go hand-in-hand; without a strategy to maintain lasting relationships with customers, brands risk losing valuable data, deals, and dollars.
Tags : 
     Emarsys - APAC
By: Emarsys - APAC     Published Date: Jun 12, 2019
Website engagement cannot be overlooked if the customer experience is the deciding factor in terms of brand loyalty in todays digital ecosystem. Here are 10 incredibly useful ways for retailers to increase website engagement.
Tags : 
     Emarsys - APAC
By: Schneider Electric     Published Date: May 31, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : data center, business growth, schneider electric
     Schneider Electric
By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; its the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : locator, uberall, store locator, location marketing, local listings
     Uberall
By: Uberall     Published Date: Apr 12, 2019
Ein Online-Filialfinder ist einer der wichtigsten Bestandteile Ihrer Website. Er sorgt dafr, dass Online-Suchende zu Offline-Kunden werden. Die Voraussetzung: Ein optimales Nutzererlebnis. Wir haben die 10 Schlsselfaktoren zusammengestellt, die Ihren perfekten Filialfinder ausmachen.
Tags : locator, uberall, store locator, location marketing, local listings, filialfinder, lokale standortseiten, ropo
     Uberall
By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : black duck software, open source, platform, sap, multi-source, code, source, database development, middleware, software testing, web development, linux, windows
     Black Duck Software
By: Oracle     Published Date: Jan 28, 2019
Market Perspectives: Making Blockchain a Reality in Retail Enterprises
Tags : 
     Oracle
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"Nothing kills attacks earlier than DNS-layer security. Protection both before and during the attack Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains.
Tags : 
     Cisco Umbrella EMEA
By: Canon Solutions America     Published Date: May 24, 2019
According to a recent study, a web-to-print solution can potentially deliver a 100% payback in six months based on the workload of 2.5 employees. If youre still on the fence about deploying web to print in your business, this guide is a must-read.
Tags : 
     Canon Solutions America
By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Top Player for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a Top Player in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection. They also cited that, Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoints solution is leading edge.
Tags : 
     Forcepoint
By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter, business integration, enterprise resource planning, sales & marketing software, video conferencing, voice over ip, workforce management, corporate portals
     Akamai Technologies
By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing, network architecture, network management, servers, small business networks
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, infrastructure, load balancing, servers, storage virtualization, green computing
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network management, servers, disaster recovery
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
     Coyote Point Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Security threats come in a variety of different forms from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: Why a holistic security approach is crucial What a new security approach looks like How Citrix solutions provide security across your entire stack
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Cloud is rapidly changing the ways we work and the rate at which work will continue to change is only going to increase. To get the full business benefits of the cloud, your organization needs an agile infrastructure that allows people to securely connect to the data they need, and has the flexibility to adapt as technology evolves. Citrix Workspace will ensure you're able to do just that improve business agility, increase productivity, and support any cloud or device as your future tech needs change. Download our e-book and find out how: To secure SaaS and web apps A single sign-on simplifies and secures log on To centralize routes to and from your data
Tags : 
     Citrix Systems
By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : live chat, live chat software, proactive live chat, online sales conversions, ecommerce, online customer experience, customer support productivity, online sales, enterprise applications
     Velaro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.