media

Results 1 - 25 of 2166Sort Results By: Published Date | Title | Company Name
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 24, 2019
All native and ‘transitioning’ media companies are focusing heavily on content to save existing businesses, or building new business models, or both. Television broadcasters, wary of the growing cord-cutting, are spending large sums on premium content. In 2017, the top four media companies spent more than USD 34 billion on original and acquired non-sports programming. Pure-play OTT providers have, on the other hand, bet big on content to shore up on subscribers. Netflix alone spent more than USD 6 billion on content last year, while spend was USD 7 billion for Amazon and Hulu combined. Transitioning media companies, such as telecom and technology companies that are moving towards being a media company, are also allocating sizable funds for content in their quest to explore supplementary businesses, by boosting customer engagement on their platforms. Apple and Facebook have started creating their own original content, and spend is only going to expand further.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 24, 2019
A leading US-based broadcasting and publishing firm, with a market value of $17 Bn plus, creates, acquires and distributes entertainment content to global consumers over diverse platforms. The Company owns iconic media brands and has the viewership base amongst the US cable networks. The Broadcaster wanted to gain deeper insights into audience viewership patterns, advertisement impressions and sales data, in order to streamline the management of its advertisement deals. LTI's ADAPT (AD Sales Audience Prediction and tracking) solution optimized allocation, management, tracking and maintenance of advertisement air time to substantial increase in Marketing ROI.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 14, 2019
Use Case Demo: -Threat detected and device quarantined -All UEM-provisioned managed apps and their content removed -All apps and content restored after threat is remediated
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 14, 2019
Use Case Demo - How a Man-in-the-Middle attack is detected and remediated
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 12, 2019
Mobile solutions can be insecure and risk-prone. With MobileIron Threat Defense, healthcare organizations can immediately determine if a user’s mobile device is compromised, if any network attacks are occurring, and if malicious apps are installed on the device.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 12, 2019
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. This paper examines some current mobile threat defense approaches to help organizations understand where traditional solutions may fall short — and how machine learning-based threat defense can expand upon those capabilities by providing immediate, on-device protection against mobile attacks.
Tags : 
    
MobileIron
Published By: Genesys     Published Date: Feb 08, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
I tuoi clienti sono ultra connessi. Fai in modo di esserlo anche tu. Trovare nuovi clienti e mantenere relazioni con quelli esistenti è un’attività impegnativa che porta via tempo. Quando i tuoi clienti sono pronti a interagire, li incontri proprio lì dove si trovano? In un mondo dai contorni sempre più digitali è fondamentale per tutte le aziende essere in grado di comunicare quando e dovunque il cliente desideri, che si tratti di una chiamata telefonica, SMS, chat online o social media. Scarica subito questo eBook per scoprire: Come coinvolgere e interagire con i tuoi clienti in un mondo ultra-connesso Come rendere semplici ed efficienti le tue attività di engagement del cliente Perché è arrivato il momento di adottare una soluzione di cloud contact center all-in-one
Tags : 
    
Genesys
Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : 
acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer
    
Acxiom Corporation
Published By: Cherwell Software     Published Date: Jan 28, 2019
In 2017, Arriva’s UK operations underwent a major IT transformation project to centralize its IT department and 13-strong service desk team. Arriva launched an RFP to find a single solution that could replace its disparate tools and fully unite the separate IT services departments. Three vendors were involved in the tender, but Alan found that Cherwell immediately stood out as the right choice and chose its IT Service Management solution.
Tags : 
    
Cherwell Software
Published By: Cherwell Software     Published Date: Jan 28, 2019
As the company continued to expand, the decision was taken in 2011 to find a different package to support its international service desk operations across Europe, the US, India and Australia. Hollister launched a competitive tender to find the right solution for its needs and explored several options as part of the selection process. Mike and the team were immediately impressed by Cherwell, both by the working culture and the flexibility and ease of use of its solutions.
Tags : 
    
Cherwell Software
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
As the march toward a forward secrecy world continues, what options do you have to inspect and act as an intermediary? Join David Holmes as he presents options to maintain visibility in the SSL service chain.
Tags : 
ssl visibility, passive inspection architecture
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
As the march toward a forward secrecy world continues, what options do you have to inspect and act as an intermediary? Join David Holmes as he presents options to maintain visibility in the SSL service chain.
Tags : 
ssl visibility, passive inspection architecture
    
F5 Networks Singapore Pte Ltd
Published By: FICO EMEA     Published Date: Feb 11, 2019
The automotive leasing and financing industry is facing its most competitive times. Market disruptors are moving quickly, leveraging technology to provide polished and high-value customer experiences to lure business away from more traditional lenders. However, the use of smart technology and automated credit decisioning can enable auto lenders to make accurate lending decisions and gain a competitive edge. Learn how you can: • Issue accurate and immediate credit financing decisions at the point of sale • Reduce delinquencies and credit losses • Grow your lending portfolio • Create winning offers using data and analytics • Speed up credit decisions to prospects and stay competitive • Use smart analytics to enhance the customer service experience Download the case study round up Digital Transformation for Automotive Finance to learn how you can transform your business.
Tags : 
collections treatment optimisation, customer retention, lending decision, collection optimisation, debt managemen, auto leasing financing, automated credit decisioning
    
FICO EMEA
Published By: Marketo     Published Date: Feb 11, 2019
your brand What content you need to support your social media marketing How often to post on social media (and how to create an editorial calendar) How to measure the effectivene
Tags : 
    
Marketo
Published By: ASG Software Solutions     Published Date: Aug 04, 2009
Businesses expect IT management to demonstrate their contributions to end-user benefits and the bottom line while addressing immediate needs and long-term performance management goals. This white paper presents IT2020, a new performance management paradigm for meeting both of these expectations.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow
    
ASG Software Solutions
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: Nuance     Published Date: Feb 09, 2011
Since Adobe debuted the PDF file format in the early 1990s, it has become the defacto standard for electronic documents in many markets. While engineers, publishers, and printers push the format to its technical limits with rich media and 3-D content, the general office worker comprises the PDF-using majority.
Tags : 
nuance, pdf, office environment, rich media, adobe, conversion
    
Nuance
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.