it management

Results 6776 - 6800 of 7068Sort Results By: Published Date | Title | Company Name
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention
    
Third Brigade
Published By: Gleanster Research     Published Date: Aug 30, 2013
Top Performers are early adopters of technologies that allow marketers to remove dependencies from third-party resources (such as IT) to impact the customer experience online – and it’s paying off. Today, technologies like web content management (WCM) and marketing automation are giving marketers control over the customer experience and real-time behavior-driven engagement.
Tags : 
    
Gleanster Research
Published By: Adobe     Published Date: May 09, 2011
Forrester recently surveyed 225 Information and Knowledge Management (I&KM) professionals with Web Content Management (WCM) decision-making or influencer roles about their WCM strategies for the coming year.
Tags : 
adobe, web content management, enterprise application, knowledge management, wcm, analytics, social networking, rich media management
    
Adobe
Published By: Percussion     Published Date: Jun 11, 2013
Many leading organizations that have invested substantial time and money building a web content management (WCM) system to run their web site often face a crossroads. Do they continue to support their own custom-built application and extend it to address the needs of the business today, or do they look to purchase a commercial software product to address these requirements. This leads to a delicate stand-off between the web site business owners (usually marketing), the development team (usually in IT) and the Finance office.
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms
    
Percussion
Published By: Janrain     Published Date: Apr 12, 2016
Now more than ever, customer loyalty and business revenue rely on hyper-personalized engagement. To resolve these issues and remain focused on their core responsibilities, IT professionals are turning to Customer Identity and Access Management (CIAM) platforms.
Tags : 
janrain, customer identity, access management, ciam, customer service, records management
    
Janrain
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to tackle the challenges of supporting BYOD programs in this on-demand webcast with Good Technology professional services consultants.
Tags : 
bring your own device, byod security, byod management, byod solutions, byod policy, byod trend, byod challenges, byod strategy
    
Good Technology Corporation
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Download this webcast today to hear guest speakers discuss and review key issues and themes around SD-WAN. Guest speakers will talk through recommendations on how to address the unique challenges that SD-WAN presents to network operations: Industry expert panel discussion featuring: -Shamus McGillicuddy, Senior Analyst, EMA -Fred Estienne, Managed Solutions Architect, Bell Canada -Paul Kohler, Director, Technical Alliances, Viptela -Time Diep, Director Product Management, CA Technologies Download and listen today!
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Download this webcast today to hear guest speakers discuss and review key issues and themes around SD-WAN. Guest speakers will talk through recommendations on how to address the unique challenges that SD-WAN presents to network operations: Industry expert panel discussion featuring: -Shamus McGillicuddy, Senior Analyst, EMA -Fred Estienne, Managed Solutions Architect, Bell Canada -Paul Kohler, Director, Technical Alliances, Viptela -Time Diep, Director Product Management, CA Technologies Download and listen today!
Tags : 
    
CA Technologies EMEA
Published By: EMC     Published Date: May 01, 2009
During this recorded webcast, you'll find out how organizations are combining 3D and 2D into their brand centers and creating new ways to engage their customers. You'll learn how CGI saves money and maximizes the reuse of CAD assets and CGI artwork for a variety of emerging media. And, you'll see a product demonstration, showing the impact 3D images can have on your marketing programs. Learn more today!
Tags : 
marketing, concent, cgi, cad, digital media, emc, images, artwork
    
EMC
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: OpTier     Published Date: Sep 28, 2012
In today's economy, businesses need to be always-on. In this webcast featuring guest speaker IDC Research Vice President, Mary Johnson Turner, we'll uncover how 2012's biggest trends are impacting Application Performance Management (APM).
Tags : 
cloud computing, analytics, mobility, application performance management, apm, apm solutions
    
OpTier
Published By: Lawson     Published Date: May 11, 2011
Check out this Lawson Talent Management demo and see for yourself how Lawson Talent Management works and what it can do for your organization.
Tags : 
lawson hcm, spaces demo, talent management solution, human capital management system, strategy, execution, actionable content
    
Lawson
Published By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
    
Oracle + Dyn
Published By: Oracle     Published Date: Jan 07, 2014
38 minute webcast discussing the rise of the empowered consumer and how consumers have changed the B2C relationship forever.
Tags : 
customer experience, customer insight, cmo and cio relationship, marketing and technology collaboration, cmo and cio collaboration, socially enabled enterprise, social business, social listening
    
Oracle
Published By: TriNet     Published Date: Jul 21, 2010
Learn about the legislation and its impact to small businesses. Get your questions on health care reform answered, and hear what other business leaders are asking, through a live Q&A session with TriNet's expert on regulatory affairs.
Tags : 
trinet, webinar, smb, health care reform, human resource, employee retention, benefits management
    
TriNet
Published By: TriNet     Published Date: Jul 22, 2010
Learn about the legislation and its impact to small businesses. Get your questions on health care reform answered, and hear what other business leaders are asking, through a live Q&A session with TriNet''s expert on regulatory affairs.
Tags : 
trinet, webinar, smb, health care reform, human resource, employee retention, benefits management
    
TriNet
Published By: TriNet     Published Date: Jul 22, 2010
Learn about the legislation and its impact to small businesses. Get your questions on health care reform answered, and hear what other business leaders are asking, through a live Q&A session with TriNet''s expert on regulatory affairs.
Tags : 
trinet, webinar, smb, health care reform, human resource, employee retention, benefits management
    
TriNet
Published By: Group M_IBM Q1'18     Published Date: Mar 26, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
identity management, idaas, cloud applications, ibm cloud identity
    
Group M_IBM Q1'18
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
    
Red Hat
Published By: Progress     Published Date: Jan 22, 2019
Your consumers are multichannel mavericks. With the right content management system, marketers can create meaningful, multi-channel journeys. Delivering a compelling, personalized customer journey across multiple digital touchpoints has never been more important. At the same time, it’s also never been so complex—many organizations struggle to personalize their campaigns and build cohesive multichannel experiences that can engage prospects anytime, anywhere. With creativity and the right content management system at your side, you can create meaningful, multichannel journeys. Watch this webinar to learn more.
Tags : 
    
Progress
Published By: Absolute Software     Published Date: Dec 16, 2009
In this webinar, Jack Heine, Research VP, Gartner, and David Holyoak, CIO of accounting firm Grant Thornton, discuss how to facilitate mobility while minimizing the risk of data exposure using web-based management and anti-theft capabilities.
Tags : 
absolute, it security, mobile management, project management, mobility, mobile security, remote management
    
Absolute Software
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: Kaseya     Published Date: Aug 27, 2010
Register and attend this webinar and also receive a complimentary copy of Kaseya's Industry Alert entitled, "Top Ten IT Systems Management Pain Points" compiled from our interactions with thousands of customers worldwide.
Tags : 
kaseya webinar, it systems management, it automation, best practices, enterprise management
    
Kaseya
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Start   Previous    265 266 267 268 269 270 271 272 273 274 275 276 277 278 279    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.