it strategy

Results 1826 - 1850 of 2092Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to reduce the cost and complexity of your web vulnerability management in order to protect your organization, website, and customers.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how security and trust are the backbone to doing business over the internet and see how your organization could be losing business because it is not taking the proper measures to protect data.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to leverage multi-use digital certificates to simplify certificate management and reduce your organization’s costs.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to properly manage your certificates and receive the 7 steps for migrating from your 1024-bit RSA to stronger SSL certified key lengths.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec     Published Date: Oct 01, 2015
Best-of-breed SSL certificates reassure businesses and customers about the security and the ease of conducting transactions over the Internet. Ideally, SSL Certificates form an integral part of a company's overall IT strategy.
Tags : 
ssl certificates, business and customer security, it strategy, privacy and safety
    
Symantec
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: AdRoll     Published Date: Oct 29, 2014
Over the past two years, advertisers have rapidly adopted retargeting on Facebook to drive key metrics like conversions, app downloads, and lead generation. Recognizing how valuable it’s been for advertisers, Facebook expanded their product line and now offers marketers two ways to retarget their website audiences on Facebook. Download this paper today to become informed on why retargeting across desktop and mobile through Facebook is becoming part of every always-on marketing strategy.
Tags : 
retargeting, facebook, desktop retargeting, mobile retargeting, web retargeting
    
AdRoll
Published By: Meltwater     Published Date: May 28, 2015
This report replaces an earlier report that was formerly the continuous improvement report for this playbook.
Tags : 
social data, social marketing, marketing maturity, marketing strategy, customer insights, marketing programs, technology brands
    
Meltwater
Published By: Crownpeak     Published Date: Jun 05, 2015
Despite the fact that a growing portion of the buyer's journey occurs online, many organizations struggle to alter their structure, processes and execution to serve a digitally oriented buyer. Moreover, there's no one-size-fits-all digital strategy that applies to every organization. The key is to understand your organization's digital type and apply the right digital strategy that fits your organization's needs. Hot off the presses from the SiriusDecisions Summit, we are delighted to share Gil Canare's presentation, "Choosing the Right Digital Strategy for You". This webinar features real life examples of different organization's digital types.
Tags : 
siriusdecisions, digital type, digital organization, digital strategy, digital transformation, customer journey, buyer's journey, customer experience, customer lifecycle, personalization, web content management, wcm
    
Crownpeak
Published By: Crownpeak     Published Date: May 18, 2016
The Disruptive Future of Digital Experience Clouds Topics Include: - IaaS vs. PaaS vs. SaaS - Addressing concerns around cloud security, integration and customizability - Availability of cloud solutions in the major DX categories - The urgency for adopting cloud solutions
Tags : 
crownpeak, forrester research, cloud, digital experience platforms, cloud solutions, saas, digital experience management, web content management
    
Crownpeak
Published By: Crownpeak     Published Date: Jul 21, 2016
This Ultimate Guide to Mapping the Buyer's Journey will show you how to: - Identify and develop customer personas specific to your business - Map your buyer's journey from consideration to purchase based on persona - Create content based on every stage of the buyer's journey - Effectively reach customers by aligning your content with their needs
Tags : 
crownpeak, marketer, buyer's journey, customer reach, marketing, consumer behavior, customer reach, content marketing, personas, customer experience, digital strategy
    
Crownpeak
Published By: Crownpeak     Published Date: Sep 21, 2016
Topics Include: - IaaS vs. PaaS vs. SaaS - Addressing concerns around cloud security, integration and customizability - Availability of cloud solutions in the major DX categories - The urgency for adopting cloud solutions
Tags : 
crownpeak, forrester research, cloud, digital experience platforms, cloud solutions, saas, digital experience management, web content management
    
Crownpeak
Published By: Wyng     Published Date: Sep 30, 2015
In today's world of information overload, your brand should not add to the clutter with a disjointed marketing strategy. Consumers have become extremely selective about who they trust and how they source information. Instead of seeking out brand produced content, consumers are increasingly relying on their peers to influence their buying decisions.
Tags : 
offerpop, marketing, awareness, digital, conversion, ecommerce, consumer
    
Wyng
Published By: Cision     Published Date: May 02, 2016
The complexity of public relations can make measurement a Herculean task. Brands have diverse needs and objectives, along with an array of communication channels to choose from, which means those searching for a one-size-fits-all blueprint for measurement will struggle to prove true ROI. A custom measurement strategy that goes beyond vanity metrics is the only way to accurately track your progress, prove the value of individual campaigns and show the impact of those campaigns across departments.
Tags : 
cision, public relations, roi, brand awareness, pr roi
    
Cision
Published By: Cision     Published Date: May 02, 2016
In the following paper, we will share the following key strategies that will fuel a successful social media strategy for your business. We will: - Outline the six strategies and technologies for creating a framework for success - Map out a social implementation model for setting up the distribution of your content in order to protect your brand when third-party platforms, such as Google and Facebook, inevitably make changes - Share the right way to think about measuring, monitoring and managing your social media strategy and performance
Tags : 
cision, social media, social media strategy, marketing
    
Cision
Published By: Cision     Published Date: Jul 08, 2016
The complexity of public relations can make measurement a Herculean task. Brands have diverse needs and objectives, along with an array of communication channels to choose from, which means those searching for a one-size-fits-all blueprint for measurement will struggle to prove true ROI. A custom measurement strategy that goes beyond vanity metrics is the only way to accurately track your progress, prove the value of individual campaigns and show the impact of those campaigns across departments.
Tags : 
cision, public relations, roi, brand awareness, pr roi
    
Cision
Published By: Influitive     Published Date: Nov 04, 2015
Create B2B customer relationships that last a lifetime -- and deliver topline value
Tags : 
advocate marketing, influitive, b2b, strategy, crm, forrester research
    
Influitive
Published By: LiveHive     Published Date: May 26, 2016
Using a multi-touchpoint strategy with automated email and call scheduling, sales organizations can quickly reach more prospects to maximize outreach efforts and improve connection rates. Download LiveHive's latest eBook to learn the five essential elements needed to implement and manage an effective multi-touchpoint sales strategy.
Tags : 
sales strategy, b2b sales, sales tools, multi-touch strategy, multi-touchpoint strategy, sales acceleration, email personalization, automated emails, qualification, conversion rate, connection rate, sales email templates, email analytics, sales intelligence, quality connects, engagement analytics
    
LiveHive
Published By: Act-On     Published Date: Apr 18, 2014
In this report, we demystify lead nurturing, offering best practices that you can follow when developing your own winning program.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy, content marketing, marketing strategy
    
Act-On
Start   Previous    67 68 69 70 71 72 73 74 75 76 77 78 79 80 81    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.