web

Results 51 - 75 of 3768Sort Results By: Published Date | Title | Company Name
By: Adverity     Published Date: Jun 15, 2018
In this whitepaper, we take a closer look at some of the biggest challenges facing e-commerce businesses, namely understanding your data in general and, more precisely, your customer acquisition costs (CAC). It's full of inspiration, useful tips and actionable insights for you to step up your marketing game. In order to reap the fruits from your data seeds, you have to make sure you tackle these five challenges full-frontal: Knowing what data to capture Understanding customer behaviour Finding your technology solution Ensuring analysis is impartial Optimising website content - especially for your offline users
Tags : marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
     Adverity
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : rdns, dns, anti-virus, security, network defense
     Akamai Technologies
By: HP Inc.     Published Date: Jun 12, 2018
You can stop waiting for what’s next in 3D printing. With the HP Jet Fusion 300/500 series of 3D printers, HP has redefined the process of prototyping and manufacturing. We invite you to explore how to make functional parts faster, cost-effectively, and in full color with HP Jet Fusion 3D devices. HP is what’s next for automated, in-house production. Visit the website to learn more
Tags : 
     HP Inc.
By: AWS - ROI DNA     Published Date: Jun 12, 2018
Achieving a 360-degree view of customers has become increasingly challenging as companies embrace omni-channel strategies, engaging customers across websites, mobile, call centers, social media, physical sites, and beyond. Learn how software solutions in AWS Marketplace can automate data lake analysis, enabling self-service platforms for analysis that expand and enhance personalization while deepening customer understanding so you can spend more time acting on insights.
Tags : 
     AWS - ROI DNA
By: Forrester Research     Published Date: Jun 11, 2018
There’s an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends aren’t working together, resulting in appealing websites and apps that don’t quite deliver. We’ve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies’ internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : cio, marketers, business, digital, customers
     Forrester Research
By: SAS     Published Date: Jun 08, 2018
Download Webinar
Tags : 
     SAS
By: dinCloud     Published Date: Jun 06, 2018
In an industry that still heavily relies on paper, the migration to the latest web enabled CRM, and an increased focus on user experience provided the Client with an innovative, multichannel enrollment & benefits administration solution.
Tags : digital, transformation, insurance, provider, crm, administration, solution
     dinCloud
By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: IBM     Published Date: Jun 04, 2018
"The appearance of your reports and dashboards – the actual visual appearance of your data analysis -- is important. An ugly or confusing report may be dismissed, even though it contains valuable insights about your data. Cognos Analytics has a long track record of high quality analytic insight, and now, we added a lot of new capabilities designed to help even novice users quickly and easily produce great-looking and consumable reports you can trust. Watch this webinar to learn: • How you can more effectively communicate with data. • What constitutes an intuitive and highly navigable report • How take advantage of some of the new capabilities in Cognos Analytics to create reports that are more compelling and understandable in less time. • Some of the new and exciting capabilities coming to Cognos Analytics in 2018 (hint: more intelligent capabilities with enhancements to Natural Language Processing, data discovery and Machine Learning)."
Tags : data analysis, data analytics, dashboards
     IBM
By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : data analytics, data storytelling, business intelligence
     IBM
By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : business analytics, analytics solutions
     IBM
By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : cisco, webex, collaboration
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Collaboration, leading to innovation, leading to success. Based upon gathering together to share ideas and information. Working together as a team to bring ideas to life. And putting together a consistently reliable, secure, scalable, easy-to-use, and easy-to-integrate system to empower all of it. Cisco collaboration solutions learn as they work together with your team. Frictionless collaboration experiences make customers happy to work together with you. Work with Cisco Webex. And your teams will work better together.
Tags : cisco, collaboration, innovation, webex
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location— across time zones or simply across the conference table. Cisco Webex makes working together what it should be - intuitive. Teams can work faster, smarter, and more effectively than ever, while providing the peace of mind that solution administrators want.
Tags : cisco, webex, collaboration
     Cisco EMEA Tier 3 ABM
By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
     Menlo Security
By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
     Menlo Security
By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: • How effectively brands are using customer data to nudge them back onto the purchase path. • How triggered messages can better engage customers and keep them coming back. • How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : revenue, email, internet, retailer, website
     Bronto
By: Amazon Web Services     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
     Amazon Web Services
By: Zendesk     Published Date: May 31, 2018
Be always on with your customers; wherever they are. With Zendesk Chat, your customer agents can engage with customers over websites, mobile apps, and popular messaging apps like Facebook Messenger, Twitter, and LINE. That means you can build relationships with customers in the places they prefer.
Tags : 
     Zendesk
By: Staples Business Advantage     Published Date: May 30, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this webinar, security expert, Ron Chestang of HP, and Michael Mayberry of Staples Business Advantage, discuss the rise of IoT, how to mitigate risk and the hidden costs of securing your network.
Tags : iot, security, security challenges, governance, network security
     Staples Business Advantage
By: CA Technologies EMEA     Published Date: May 30, 2018
The trend speaks volumes. By 2020, more than 50% of global enterprises will be running containerized applications in production, up from less than 20% today, according to Gartner. And IDC says that by 2021, more than 95% of new microservices will be deployed in containers. CA Technologies has produced this webinar to look at the how a one- size fits all approach does not always work.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 30, 2018
The trend speaks volumes. By 2020, more than 50% of global enterprises will be running containerized applications in production, up from less than 20% today, according to Gartner. And IDC says that by 2021, more than 95% of new microservices will be deployed in containers. CA Technologies has produced this webinar to look at the essentials of Container Monitoring so download right away to find out more.
Tags : 
     CA Technologies EMEA
By: Amazon Web Services     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
     Amazon Web Services
By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
     CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.