esi

Results 326 - 350 of 3202Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Mar 23, 2010
With sleek designs and a variety of user-friendly features, smartphones have implanted themselves on the public's consciousness-so much so that one leading industry research firm reports that a record 54.5 million such mobile devices were shipped in the fourth quarter last year. With sales rising nearly 40 percent over the same quarter in 2008, the message is clear: Smartphones are hot, and not just for mobile workers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
It’s now easier than ever to tap in to the power of BlackBerry® Technical Support Services. Find out what’s changing, and learn about BlackBerry Readiness Services designed to streamline your move to BlackBerry® 10.
Tags : 
blackberry technical support services, blackberry 10, enterprise services that help, streamline your move, transition easier
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
BlackBerry® Enterprise Service 10 is designed to help organizations like yours address the full spectrum of Enterprise Mobility Management (EMM) challenges. In this webcast, find out what senior IT leaders like most about it.
Tags : 
blackberry 10, service, emm, enterprise mobility management
    
BlackBerry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BlackLine     Published Date: Jun 12, 2017
The last ten years have seen two seismic shifts for accounting and finance teams. First, the expectations of finance have changed: be more efficient and agile in an increasingly regulatory environment while also being more strategic. Secondly, a new wave of modern finance apps have arrived for core accounting, financial close, and planning and reporting, that are designed to automate more and analyze more.
Tags : 
    
BlackLine
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
In this Product Brief, Clabby Analytics examines BLADE’s “rackonomics” concept (the idea that putting switches into blades and racks is more economical than using external core switches) — and its two new RackSwitch offerings (the G8000 and G8100) designed to implement its rackonomics view.
Tags : 
rackonomics, overloaded networks, blade network technologies, rackswitch, g8000, g8100, cisco, external core switches
    
BLADE Network Technologies
Published By: Blue Coat     Published Date: Feb 09, 2016
This Blue Coat white paper details potential issues to consider before using cloud services; and how encryption and tokenization can enable you to safely adopt the cloud while adhering to appropriate guidelines.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
Based on the analysis of over 63M documents shared in the cloud, this report highlights key trends and insights into the usage and security of cloud apps and the data residing in them.
Tags : 
    
Blue Coat
Published By: Blue Coat Systems     Published Date: Apr 05, 2012
This Webcast , discusses how hybrid web security can tackle these tough challenges. Hear pros and cons of various deployment options and key considerations for even the most cloud-hesitant security professionals.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : 
titan, tiered storage, storage, bluearc, storage system
    
BlueArc Corporation
Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding
    
BlueHornet
Published By: Bluelock     Published Date: Nov 15, 2012
Codesigned is a technology services firm focused on high quality, collaboration solutions specializing in Microsoft SharePoint. Read on to learn how Bluelock provided a consulting firm, a reliable and industry proven cloud hosting platform.
Tags : 
bluelock, codesign, microsoft sharepoint, sharepoint, collaboration, cloud hosting
    
Bluelock
Published By: Bluestreak     Published Date: Jan 22, 2007
"Personal and Dynamic Email Campaigns" provides key metrics that emphasize the importance of personalizing and timing emails, and tips to use email as a relevant direct marketing tool. Download this presentation now!
Tags : 
personalization, content personalization, email marketing, newsletter design, dynamic emails
    
Bluestreak
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Many Learning and Talent Management platforms don’t have the flexibility to customize the type of reporting that users want, or it’s too complicated to figure out. Bluewater’s team of developers and designers can create completely customized pages within your Learning and Talent Management System* for a seamless delivery of what you need,
Tags : 
    
Bluewater Learning
Published By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
Published By: BMC Control M     Published Date: Jul 16, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Control M
Published By: BMC Software     Published Date: Jun 30, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.