ca wa

Results 76 - 100 of 7196Sort Results By: Published Date | Title | Company Name
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
     Limelight Networks
By: ITManagement     Published Date: Jul 24, 2008
The days of deploying new equipment for the sake of having the latest and greatest ended when the Internet bubble burst. So when you know it's time for a network upgrade, you need to have more than the technical facts — you need to arm yourself with a rock-solid business case. Start with these 10 ways to sell the members of your upper-management team on the network upgrade.
Tags : it management, upgrade, servers, management, network, network upgrade, selling management, itmanagement
     ITManagement
By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security
     Panda Security
By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
     McAfee
By: SAP Concur     Published Date: Aug 07, 2019
"Creating an expense policy can be a time-consuming process, but when you consider that almost 20% of T&E expenses fall outside of policy it makes sense to invest the time and effort. This template walks you through how to build a best-practice expense policy and also explains what each section should cover. In the template you will find: Explanations for each expense category in plain language Lists of common questions about expense policies, pitfalls 11 tips for creating a straight-forward policy that increases compliance Get started on your expense policy today."
Tags : 
     SAP Concur
By: CEB     Published Date: May 19, 2014
Twelve Key Trends in Contract Management CEB Legal’s contract management survey results allow general counsel to evaluate their current contract review and monitoring processes against hundreds of their peers at midsized companies. Your peers are using our 12 Key Trends in Contracts Management to: o Gain in-depth insight into the challenges and viable solutions presented by the current contracts management landscape. o Determine the scope of their contract review policies. o Identify opportunities to accelerate their approach across the contract life cycle -- from drafting through negotiation, review, and monitoring. o Improve efficiency using contract management software, including a review of key features and associated costs
Tags : ceb, legal, contract management, contract review process, contract management software, contract life cycle
     CEB
By: InsightSquared     Published Date: May 04, 2016
If you want to improve your sales team's results, you need to start by asking the right questions. Download this new best-practices eBook to learn about the 12 key questions for data-driven Sales Managers. This informative guide will help you: - Determine Key Metrics For Sales Management - Improve Sales Team Productivity - Closed-Won More Deals Download a free copy of "12 Must-Ask Questions for Data-Driven Sales Managers" today.
Tags : salesforce reporting, salesforce analytics, sales analytics, sales reporting, sales pipeline, sales forecasting, pipeline management, sales performance
     InsightSquared
By: Cox Communications     Published Date: Nov 10, 2014
One of the most fundamental aspects of marketing your business is having the right technology in place, And at the forefront of your technology hub should be a reliable phone service. Having a dependable phone network your company can is vital in more ways that one. Even in today's world of competing technology and emerging tech-trends, a proper phone system is the link that enables you to connect with anyone, from co-workers down the hallway to the business partner on the other side of the globe.
Tags : tech-trends, voip, pbx, hosted pbx, sip, ports, did, pots
     Cox Communications
By: Esker     Published Date: Jan 08, 2019
It’s not uncommon that customers are slow to adopt e-invoicing. Fortunately, we’ve got some tips on how your company can maximize the success of your AR automation project and persuade even the surliest of customers. In this guidebook, you’ll discover how to build a successful plan that: • Targets the right customers • Offers customers various payment options • Promotes & rewards e-invoicing adoption
Tags : 
     Esker
By: ServiceSource     Published Date: Nov 01, 2013
How strong is your renewal program? Are you able to predict and analyze your performance correctly? ServiceSource® believes that the real yardstick of renewal performance lies in a comprehensive set of key performance indicators (KPIs) that can tell a much broader story. Over the last 13 years and over 145 engagements, we’ve identified these twelve critical factors for successfully measuring and growing your renewal revenue. This whitepaper provides a detailed overview of those KPIs.
Tags : reducing customer churn, servicesource, maximize revenue, essential kpis, renewal opportunity, renewal results, sales process, performance drivers
     ServiceSource
By: ServiceSource     Published Date: Sep 15, 2015
The principle “what gets measured gets managed” dictates that by simply examining an activity, you can get a handle on it and find ways to improve it. However, not all metrics are created equal—meaning not all things that can be measured will give you the ability to proactively take action in a timely manner. Case in point: If you measure the effectiveness of your customer success and recurring revenue growth programs based only on retention, churn, renewal or attrition rates, then you have a problem. These are very important metrics, and they are definitely key to your business. The problem is that these metrics can only tell you if you have a problem, which you often discover only after it is too late to affect real change.
Tags : 
     ServiceSource
By: Sage     Published Date: Oct 17, 2013
Learn about the numerous considerations that must be taken into account when changing your payroll process and see how these 15 factors can guide you towards the best solution for your organization.
Tags : process payroll, payroll, employee management, productivity, performance, business technology
     Sage
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Business protection should never be taken lightly, but it can be tough to know where to begin. This checklist is a way to get you started, helping you safeguard your company.
Tags : business protection, intrusion, vandalism, theft, security
     Tyco Integrated Security
By: ReadyTalk     Published Date: Sep 19, 2014
Recently, ReadyTalk, a leading provider of conferencing and webinar services, answered 20 content marketing and webinar questions. The questions came directly from webinar participants; marketers just like you who wanted practical, actionable advice.
Tags : webinars, qualified, leads, generation, strategy, marketing, investment, time
     ReadyTalk
By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase a Manufacturing/ERP software solution, the 2009 Top 10 Manufacturing Software Vendor Report from Business-Software.com can help you find the software that is right for your company. Must Read!
Tags : erp, manufacturing, erp software, enterprise resource planning, mrp, manufacturing software, enterprise applications
     Business-Software
By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase a Supply Chain Management (SCM) software solution, the 2009 Top 10 Supply Chain Management Software Vendor Report from Business-Software.com can help you find the software that is right for your company. Must Read!
Tags : erp, erp software, enterprise resource planning, supply chain management, scm, enterprise applications
     Business-Software
By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase an Enterprise Resource Planning (ERP) software solution, the 2009 Top 10 ERP Software Vendor Report from Business-Software.com can help you find the software that is right for your company.  Must read!
Tags : erp, manufacturing, erp software, enterprise resource planning, mrp, manufacturing software, enterprise applications
     Business-Software
By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
     McAfee
By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus
     ESET
By: CBIZ     Published Date: Aug 27, 2013
Are you prepared for health care reform? This 3-page checklist guides you through the general compliance requirements of the Affordable Care Act (ACA) to help you prepare now for 2014 and beyond. The checklist is broken down into five categories: 1. Health Plan Action Items; 2. Employer Tax Changes; 3. Fees and Filings; 4. Shared Responsibility Employer Preparation; and 5. ACA Provisions beyond 2014.
Tags : health care reform, health reform checklist, affordable care act, aca, shared responsibility, grandfathered, waiting period, summary of benefits and coverage
     CBIZ
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
     Blue Coat Systems
By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : progress software, choosing vendors, datadirect, connectivity, saas applications, big data, data warehousing, nosql
     Progress Software
By: LogMeIn     Published Date: Mar 19, 2015
Remote support technology, including remote control, desktop sharing, and web collaboration, is one of the most popular platforms used across TSIA service disciplines. Today’s remote support solutions offer much more than just remote control for PCs, their functional footprint is expanding to include support for more devices and richer analytics for trend analysis and supervisor dashboards. Remote support solutions are typically well regarded by users, consistently delivering one of the highest average satisfaction scores in TSIA’s annual Global Technology Survey. Service executives should acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support. Field services, education services, professional services, and managed services are all increasing adoption of these tools to boost productivity and avoid on-site visits. Download this white paper to learn more.
Tags : remote support, remote technology, customer support, productivity, remote technology
     LogMeIn
By: Okta     Published Date: Mar 10, 2016
The Forrester Wave report identifies the six most significant solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
     Okta
By: Cisco     Published Date: Aug 27, 2015
Gartner's evaluation of 16 contact center infrastructure (CCI) vendors in its 2015 CCI Magic Quadrant report.
Tags : contact center infrastructure, unified communication, infrastructure management, crm, customer relationship management, cci solutions, enterprise software management
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com