compare

Results 351 - 375 of 552Sort Results By: Published Date | Title | Company Name
Published By: LifeLock     Published Date: May 10, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for businesses to look for in selecting a partner. Compare now!
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Aug 23, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for employers to look for in selecting a partner. Compare now!
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: LiveHive     Published Date: Feb 16, 2016
Using insights from today's leading experts, use this quick, actionable guide to see where you stand compared to best in class organizations.
Tags : 
sales process, livehive, best practices, sales productivity
    
LiveHive
Published By: LogMeIn     Published Date: Oct 08, 2015
This infographic illustrates how live chat users compared to non-users perform across key metrics such as revenue growth, and cost reduction as well as creating positive customer word-of-mouth.
Tags : 
live chat, customer service, customer support, live chat success, best practices for agents and admins
    
LogMeIn
Published By: Look Listen     Published Date: Aug 22, 2019
Companies that can harness the power of data are tomorrow’s winners. At Acoustic, we believe deeply in the importance of putting data into context to help companies quickly determine which marketing messages are resonating and which strategies are outpacing the market. The 2019 Marketing Benchmark Report examines email and mobile marketing messages sent by thousands of brands in 2018 to establish industry standards on customer engagement, delivery and subscriber churn. Our analysis uncovers trends and benchmarks than can help you optimize your audience outreach. Use this valuable information to compare how your campaigns are performing, see where to focus your efforts and build your case for more investment.
Tags : 
    
Look Listen
Published By: Looker EMEA     Published Date: Sep 27, 2017
Deploy Business Intelligence in Days, Not Months. Fastest Implementation Time -Up and running in 24 days compared to 78 on average (300% faster). ? Ease of Use - Top to bottom, Looker is easier ? User Adoption - More data lovers switch to Looker Deploying a new BI platform doesn’t have to be a long, painful process anymore. See how 21 leading BI vendors compare in terms of overall user satisfaction for implementation -Download the Report >>
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Looker EMEA
Published By: Lookout     Published Date: Mar 28, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share.
Tags : 
enterprise, mobile, ios, android, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : 
encryption, bitlocker, data protection, endpoint, security, best practices
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : 
lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware, client endpoints, vendors, lumension solution, database transaction, change management, test environment, tolly, malware block, security suite, endpoint protection
    
Lumension
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring
    
McAfee
Published By: Mediative     Published Date: Jan 14, 2008
Comparing the two search engines predominantly used by Chinese searchers – Baidu and Google.cn – Enquiro conducted an eye tracking study with Chinese students to answer how Search user interaction can differ between cultures, languages and reading patterns. How do Google and Baidu compare? And how do Chinese searchers use organic vs. paid listings?
Tags : 
china, asia, international, baldu, chinese, chinese government, culture, cultural influence, google.cn, google, search engine, search marketing, enquiro, enquiro research
    
Mediative
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Sep 11, 2009
"As the number of enhancements to various Hardware Description Languages (HDLs) has increased over the past year, so too has the complexity of determining which language is best for a particular design. Many designers and organizations are contemplating whether they should switch from one HDL to another. This paper compares the technical characteristics of three, general-purpose HDLs.
Tags : 
comparison of vhdl, verilog and systemverilog, mentor graphics, hardware description languages (hdls), vhdl (ieee-std 1076), verilog (ieee-std 1364), ieee standard, accellera
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 12, 2016
This paper, nominated for the DesignCon 2016 Best Paper Award, analyzes the computational procedure specified for Channel Operation Margin (COM) and compares it to traditional statistical eye/BER analysis.
Tags : 
mentor graphics, ber, com, channel compliance
    
Mentor Graphics
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : 
microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security, tco
    
Microsoft Windows Phone
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data, conversion, marketing roi, direct mail campaign, multi channel marketing, integrated marketing campaign, lead generation, campaign management, tracking and measurement, reports and analytics, marketing dashboard
    
Mindfire
Published By: Mitel     Published Date: Jan 21, 2019
La question n’est plus de savoir quand, mais comment vous passerez vos communications dans le cloud. Et c’est l’un des principaux enseignements de cette seconde édition de notre enquête sur la perception du cloud par les entreprises européennes. L’adoption des solutions cloud, synonymes d’innovation pour une grande majorité des répondants, semble inéluctable. Dans un monde où la capacité des entreprises à se transformer rapidement est devenu critique, le modèle du paiement à l’usage répond à leurs attentes de flexibilité et d’innovation, particulièrement en termes de collaboration. Grace à cette enquête, nous pouvons comparer les sensibilités des responsables d’entreprise et mieux appréhender les différences culturelles et les freins potentiels en fonction des pays. Les réponses selon les pays sont souvent similaires, à quelques exceptions notables, qui sont révélatrices des différences de maturité d’adoption des solutions cloud en Europe. Si chaque pays conserve des spécificités, le S
Tags : 
    
Mitel
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron
Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Frost & Sullivan has detailed leading mobile solution deployments, products in development and new product features and modifications for leading solution vendors in the mobile enterprise space. All solutions were then compared, evaluated and ranked based on parameters considered as critical in the implementation of a wireless enterprise solution.
Tags : 
mobile, wireless, wireless products, wireless phones, mobility, motorola, motorola good
    
Motorola
Published By: NAVEX Global     Published Date: Jul 17, 2017
The 2017 EMEA & APAC Whistleblower Hotline Benchmark report was produced with data from companies of all sizes and industries across the region. Use the findings to put your company’s whistleblowing report data in context or gain organisational alignment to start your whistleblower programme. Use this report to answer questions like: • Am I getting too few or too many reports compared to like-sized companies? • Is my organisation following up on cases in an appropriate timeframe? • How can I more effectively follow-up on anonymous reports?
Tags : 
emea, apac, ethics, whistleblowing, incident management, reporting data, case closure, reporting systems, anti-retaliation
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your policy and procedure management programme to industry standards and identify where your programme needs improvements. Read the top challenges policy management programmes face in 2018 and expert recommendations on meeting those challenges. What You'll Learn: Where organisations are struggling with policy management What the best organisations do to create efficiency in their programme How organisations are starting to comply with new SFO and DOJ guidance How automated systems improve results and satisfaction for policy management
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your employee reporting metrics and measure your compliance programme & organisational culture against 4.5 million reports. Get answers to questions like: Are your employees likely to speak up? Are there reports of misconduct you’re missing? Does fear of retaliation encourage external reports? NAVEX Global's key findings in the following areas: Report volume Report allegation categories Anonymous vs named reporting Follow up and substantiation rates Case closure times
Tags : 
    
NAVEX Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.