rsa

Results 276 - 300 of 552Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Mar 13, 2018
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: Guidance on selecting devices for different workspaces Information on the newest collaboration features and benefits Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom
Published By: Oracle     Published Date: Apr 16, 2018
Embora 89% dos líderes de marketing acreditem que devam fornecer uma experiência ideal aos clientes e, assim, criar um diferencial para seus produtos e serviços na era digital, apenas 20% acreditam cumprir com êxito esta premissa. Isso significa que existe uma dificuldade por meio dos profissionais de marketing em alcançar seu público em canais diferentes, o que resulta em taxas de conversão baixas, relacionamentos curtos com clientes e perda de receita. Veja como O Oracle Marketing Cloud oferece simplicidade para as equipes de marketing, voltado para os públicos relevantes e uma solução escalonável de TI
Tags : 
como, conversar, publico, diferentes, canais, marketing
    
Oracle
Published By: Main Street Hub     Published Date: May 06, 2016
This essential guide contains everything you need to know about using Twitter for your business. Learn how to attract new customers, continue conversations with existing customers, and keep them coming back!
Tags : 
local business, small business, business owner, social media for business, twitter, facebook, social media service, marketing, customer service, business technology
    
Main Street Hub
Published By: Infosys     Published Date: May 22, 2018
When products are bought off the shelf, they are easy to price. But what happens when every product has to be configured to create an entirely bespoke solution? Our client manufactured sophisticated industrial machinery that needed to be configured to each customer, which made each quote a complex task. Sales teams had to somehow translate the customers' complex requirements into a solution; selecting the right products, features, and components; and ensuring that the end result would be not only compatible but also deliverable. Also, the quote frequently had to include various offer variations and price points. The conversation about pricing could only begin once all of this had been discussed, agreed upon, and approved.
Tags : 
sales, customer, product, manufacturer, customer, solutions
    
Infosys
Published By: EverString     Published Date: Jul 27, 2018
You have lots of leads, but finding the right match is getting harder and harder. You know the good leads are out there. They might even be looking for you. The trouble is, those good leads are hidden among so many bad ones. Your sales and marketing teams know this. They’re facing a deluge of data, not all of it reliable, and they’re trying to decode that data using outdated point solutions and imperfect criteria. Which means a lot of time spent running campaigns, initiating conversations and booking meetings that go nowhere. If this were the dating world, we’d be talking about a calendar full of bad first dates. Everyone’s “swiping right,” but no one’s truly matching. No one’s getting a second date. No one’s committing. Something just isn’t working. We can’t help you if you’re dating. But if you’re trying to sell your company’s products and services—well, the game is about to change. Instead of moving through a volume of potential customers as quickly as possible to build pipeline, th
Tags : 
    
EverString
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Ensighten     Published Date: Jul 25, 2012
This video will teach you how tag management systems increase ROI from 3rd party tags, improve analytics and customer satisfaction.
Tags : 
web analytics, ensighten, marketing, tag management, tag marketing, internet marketing, insighten, universal tag, e-commerce, tag management roi, flash tagging, mobile tagging, universal tag, tag management systems, 3rd party tags, tms
    
Ensighten
Published By: Genesys     Published Date: Dec 20, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences Start small and deploy fast with MicroApps
Tags : 
    
Genesys
Published By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
security, technology, security tactics, data
    
Cisco
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: MuleSoft     Published Date: Nov 27, 2018
In response to the federal government’s Cloud First initiative, agencies are moving to the cloud at an accelerated rate - moving on-premise applications, data and workloads to cloud infrastructure and adopting SaaS technologies like Salesforce, ServiceNow and Workday. What many in government have found is that integration and looking for government integration solutions has emerged as a stumbling block that has prevented government from realizing many of the benefits of moving to the cloud. This is because while a growing number of applications adopted by government are in the cloud, the underlying integration technologies connecting these applications are still based on-premise, meaning that government IT teams still have to spend time provisioning and maintaining infrastructure to ensure that their middleware doesn’t become a performance bottleneck for their applications. Join us for a conversation with MuleSoft CISO Kevin Paige on why cloud integration is key for agencies to succe
Tags : 
    
MuleSoft
Published By: Smarp     Published Date: Feb 22, 2019
By definition employee advocacy is the promotion of a company’s messages by its employees. Today, employee advocacy happens increasingly online, social media being the main medium for brand ambassadors. Employees have extensive networks of friends, followers, and connections on social media, and nowadays they can be reached and influenced with a click of a button. When empowered to act as brand ambassadors on social media, employees can share valuable content to their networks and build their professional brand all while increasing the company’s reach and credibility by generating meaningful conversations about the business.
Tags : 
employee advocacy, employee engagement, social media, social media visibility
    
Smarp
Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showing the benefits of an RSA Averska IAM Solution.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
Tags : 
emc, rsa, ecat, enterprise compromise assessment tool, malware threats, malware detection, compromise assessment, compromise monitoring, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : 
emc, security threats, malware threats, malware protection, kill chain, rsa, defense, security
    
EMC Corporation
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, business technology, data center
    
CDW Symantec
Published By: Payscale, Inc     Published Date: Apr 04, 2018
This is your crash course in the compensation language. Find all the terms you need to master any compensation conversation. You’ll be ‘comp’letely fluent in no time.
Tags : 
    
Payscale, Inc
Published By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 20, 2013
In this report, we examined the online conversations around Fashion Week in New York, London, Paris and Milan to find out exactly what makes fashion enthusiasts and buyers tick—and reveal trends and insights to help make fashion brands smarter.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputation monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework, security, data management
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
Tags : 
access management, iam, intelligence, business context, identity, security, data management
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning. Today’s organizations are demanding a business-centric approach to provisioning.
Tags : 
provisioning, risk, managing access, enterprises, security
    
RSA
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee