content management

Results 326 - 350 of 540Sort Results By: Published Date | Title | Company Name
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : 
content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
    
Limelight
Published By: Limelight Networks     Published Date: Jul 31, 2012
There are a wide variety of video platforms available, each offering a plethora of features. How do you decide which features you need and the features you don't need? In this paper you will receive ten tips and suggestions on how to make the correct choice for all of your online video platform needs.
Tags : 
online, video, publishing, video, platform, content, management, media, player, multi-channel, design, visual, advertising, analytics, scalable, channel, content, syndication, enterprise applications, business technology
    
Limelight Networks
Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation, demographic, visitor identification, campaign tracking, lead scoring, progressive profiling, lead qualification, social engagement, multiedvice, multilingual, multisite support, business technology
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Litmos     Published Date: Apr 23, 2015
This guide outlines the foundational building blocks of a Rockstar Customer Training Department. This guide applies to everyone tasked with customer training, regardless of company size.
Tags : 
customer training, scaling, litmos, curriculum design, content creation, digital media creation, learning management system
    
Litmos
Published By: Logicworks     Published Date: Jan 27, 2014
In this whitepaper, you will learn how to overcome 3 fundamental problems that organizations face in the context of managing their backup windows.
Tags : 
logicworks, backup, backup window, back-as-a-service, baas, restores, archiving, cloud, storage, content storage, compliance, data management
    
Logicworks
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management, security
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: Marketo     Published Date: May 18, 2017
While ABM is not a new way to strategically market to target accounts, now it is a scalable, achievable strategy that organizations of all sizes can implement to focus on whole lifecycle marketing for key accounts. Marketing, selling to, and supporting your customers at an account-level is not only critical to your success, it’s what your customers expect. Competitive organizations that are focused on engaging their customers across the entire lifecycle, and throughout their buyer journey, need to sell at an account level, understand the influence of the different contacts and speak directly to them. The ABM we practice today is entirely different than the manual processes of days past. Implementing an ABM strategy no longer means an astronomical investment but it does mean increased revenue, focus, and partnership within your organization.
Tags : 
organization management, target accounts, engaging content, channel optimization, analytics, technology management, abm strategy, communication management
    
Marketo
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In a free audio/video Webcast with MarketingSherpa’s Anne Holland, learn valuable, tested B-to-B marketing tips, including how to stop spending too much on SEM while making your remaining SEM budget work harder... how to make prospects pay attention to your content... the key difference between case studies and success stories... when—and why—you should consider removing the registration page... and more.  Don’t miss these proven tips—watch the free 30-minute Webcast now.
Tags : 
promo code: wp3, marketing sherpa, marketingsherpa, b-to-b, b2b, b-to-b marketing, b2b marketing, marketing budget, lead generation, demand generation, direct marketing, lead conversion, registration page, registration, landing page, white paper, content, sem, search engine marketing, search marketing
    
Marketo, INC.
Published By: McAfee     Published Date: Apr 10, 2013
This report details Forrester's findings about how well each vendor fulfills the 47-criteria evaluation and where each vendor stands in relation to each other to help security and risk professionals select the right partner for their email content security solution.
Tags : 
email content security, email encryption, forrester wave, on premises, saas, email security management, mcafee email gateway, security, business technology
    
McAfee
Published By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : 
microsoft, office, content management, knowledge management, enterprise applications, data management
    
Microsoft Office
Published By: Microsoft Office     Published Date: Nov 07, 2008
To allow organizations and individuals the flexibility to address their specific challenges, Microsoft has a variety of Microsoft® Office suites to select from. This paper describes the commonalities and differences among the suites of the 2007 Microsoft Office system: Microsoft Office Standard 2007, Microsoft Office Professional Plus 2007, Microsoft Office Enterprise 2007, and Microsoft Office Ultimate 2007. Each suite provides the core Microsoft Office applications as well as features that support integrated content management, information rights and policy, and integrated electronic forms; however, they differ in the selection of included applications and the ways in which advanced features are implemented.
Tags : 
microsoft, office, office suites 2007, enterprise applications, platforms, data management
    
Microsoft Office
Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
The ultimate goal of this guide is to aid the reader in performing a thorough and effective evaluation of Microsoft® Office SharePoint® Server 2007. This guide is intended for anyone who is interested in learning more about Office SharePoint Server 2007 and wants hands-on experience.
Tags : 
sharepoint, microsoft office, sharepoint server, collaboration, search, portal, internet, content management, cms, it management
    
Microsoft Office SharePoint Server
Published By: Microsoft Office SharePoint Server     Published Date: Nov 07, 2008
Engineering firm Barge Waggoner Sumner & Cannon, Inc. needed to collaborate more efficiently across its 11 offices in the eastern United States. The firm chose ProjectWise collaboration software for engineering content management, content publishing, and design review, and integrated it with Microsoft® Office SharePoint® Server 2007, to manage business processes and documents in a distributed environment. Find out more.
Tags : 
microsoft, sharepoint server, application virtualization
    
Microsoft Office SharePoint Server
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: MindTouch     Published Date: Mar 08, 2019
Chatbots are hungry and knowledge management is the secret sauce. Chatbots are all the rage. They help customers find information and answers. They help contact centers automate tasks and create considerable efficiency gains. How, then, do organizations ensure their chatbots consistently deliver A+ experiences? The answer is knowledge management. Without the availability of rich, relevant content, chatbots have very little to work with during customer interactions. They won’t be able to accurately match user intent with the right information. And that’s no good for the customer. How knowledge management changes all that is the topic of our latest whitepaper.
Tags : 
    
MindTouch
Published By: MobileIron     Published Date: Oct 29, 2018
Drive mobile productivity through secure content management
Tags : 
    
MobileIron
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx, data management
    
Nemx Software Corporation
Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, email control, email policy, compliance management, nemx, nemx software
    
Nemx Software Corporation
Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance, nemx
    
Nemx Software Corporation
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Accor is one of the world's largest travel, tourism and corporate services companies. With over 4,000 hotels worldwide, Accor Hotels covers all segments from economy to upscale. Sofitel, Novotel and Motel 6 are just a few of Accor's hotel brands. Accor's online relationship marketing strategy aims to convert prospects into customers and build customer value through increasing the depth of relationships and growing revenues from repeat bookings, cross-sales, up-sales and referrals.
Tags : 
neolane, accor hotels, online relationship marketing strategy, improve reactivity rates, campaign personalization, collaborative content management, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee