intent

Results 51 - 75 of 120Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways, security management, security policies, web service security
    
Websense
Published By: Allscripts     Published Date: May 01, 2014
Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.
Tags : 
allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional, manual processes, meaningful use, risk management, risk assessment, software updates, secure data, automation, hosted solution, outsourced billing, access control, security management
    
Allscripts
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data center
    
Tripwire
Published By: Webroot Inc     Published Date: Jan 15, 2015
The old canon of long-lived viruses with random targets created by hacktivists for fame or nuisance has given way to a new generation zeroday/hour threats from organized criminals, with hand-picked targets and specific, malicious intent. In mid-2014, on a daily basis, Webroot saw 25,000 new malicious URLs, 777,000 new unknown files, many of which are malicious, and 1,000 new phishing sites. In the face of such exponential growth, traditional, reactive security can’t hope to keep up. Not only is the volume of unknown threats overwhelming existing security solutions, but the unique characteristics of unknown threats are also making it difficult for traditional security to catch them.
Tags : 
threat intelligence, malicious ip activity, reactive security, security solutions, security
    
Webroot Inc
Published By: Lucidworks     Published Date: Jun 24, 2015
Using content, context, and the crowd to build better search applications.
Tags : 
search platform, search query, search technologies, big data, high-volume data, database advancements, it management, knowledge management, platforms, data management, intent, context, data center
    
Lucidworks
Published By: BlueData     Published Date: Aug 19, 2015
Big Data is on virtually every enterprise’s to-do list these days. Recognizing both its potential and competitive advantage, companies are aligning a vast array of resources to access and analyze this strategic asset. However, despite best intentions, the majority of these Big Data initiatives are either extremely slow in their implementation or are not yielding the results and benefits that enterprises expect. Download this white paper to learn how to solve the Big Data intention-deployment gap and see how you can make your infrastructure in a flexible, easy-to-use platform that will provide in-depth analytics.
Tags : 
big data, big data intention-deployment, in-depth analytics, hadoop, data center
    
BlueData
Published By: BlueData     Published Date: Aug 19, 2015
Over the past few years, “Big Data” has evolved from an interesting technology topic into a source of major competitive advantage, in which IDG conducted a survey and found out that 60% of enterprises are planning on spending an average of $8 million on Big Data initiatives. However, somewhere between intention/investment and executive/production, Big Data initiatives are falling into a gap. Download this white paper to find out how to change the equation on Big Data spending and learn what the successful companies are doing in order to achieve a success from your Big Data applications.
Tags : 
bigdata, hadoop, big data spending, big data projects, it commitments, data center
    
BlueData
Published By: Monotype     Published Date: Mar 28, 2017
Your brand may have throngs of fans and followers — people who “Like” or “Follow” a particular page or account. While these metrics are certainly important, they don't always equate to obvious value for your brand. The followers who are so passionate that they're creating branded content and advocating for you are the ones to focus on. Advocates are one of the best, most cost effective ways to drive business, hands down. Advocates are users with a true connection, passion and commitment to a particular brand or product. Advocates drive action, not just awareness, and unlike paid advertisers, they advocate because they want to. The second a customer becomes so invested in your brand that they share the love with their networks, they become your best marketer.
Tags : 
swyft, branding, brand advocates, consumer, purchase intent, content, media
    
Monotype
Published By: Moxie     Published Date: Feb 08, 2018
You’ve worked hard to build your brand—to understand who your customers are, to convey a compelling message that draws them into your site, and to create engaging content that keeps them there. At the most critical point in the sales process, seize the opportunity to communicate directly with your number one lead at the height of their decision and use this checklist to make that possible.
Tags : 
mobile, commerce, checklist, intent, customer, metrics, ecommerce
    
Moxie
Published By: Turn     Published Date: Mar 09, 2016
From awareness to consideration to intent to conversion, marketers can now track campaigns at an extremely detailed level. Learn how to align the right programmatic tactics and metrics for each stage of the customer journey.
Tags : 
programmatic, omnichannel, multichannel advertising, dsp, demand side platform, omnichannel campaigns, audience definition, campaign tactics, campaign strategy, awareness, conversion
    
Turn
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility
    
LogRhythm
Published By: BrickWork Software     Published Date: Oct 24, 2017
80% of store customers begin their journey to your store online. Retailers need to capitalize on the new digital-to-store customer journey. To identify and convert online shoppers who prefer to purchase in-store, you need to understand offline intent. In this guide, we answer these questions: ? What is offline intent? ? Why does it matter? ? What can brands and retailers do to capture it?
Tags : 
    
BrickWork Software
Published By: Apstra     Published Date: Feb 21, 2019
The enterprise data center has undergone several major shifts since the introduction of computing as a business resource. Data centers have evolved from mainframes to client/server to virtual servers, and then to being “software defned,” and fnally to their current state of disaggregation. Today, we sit on the precipice of the next major data center transition—the evolution to an intent-based data center (IBDC) (Exhibit 1). Each transition saw the cost of computing decrease and the importance of the network increase, and each enabled organizations to boost the efciency of their data center operations and improve asset utilization—ultimately leading to a better experience for users
Tags : 
ibn, ibdc, data center infrastructure
    
Apstra
Published By: Apstra     Published Date: Feb 21, 2019
Customers and partners, and recently investors ask the question “How is one Intent-Based Networking (IBN) offering different than the others?” And more often than not I hear answers that sound subjective, descriptive, and subject to interpretation. What is needed are tangible, fact-based nomenclature that can help you reason about the maturity of IBN solutions. Using this nomenclature, we should be able to map IBN solutions to an IBN maturity level, starting with Level 0 (low maturity/incomplete) and going up to Level 3 which enables a fully compliant IBN solution (mature/complete).
Tags : 
ibn, saas
    
Apstra
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Apstra     Published Date: Feb 25, 2019
This in-depth white paper explains how service providers are capitalizing on Intent-Based Networking — a new and effective networking model that provides a way of abstracting an application, feature, network, or resource in such a way that the intent is exposed, but the implementation is hidden.
Tags : 
apstra, intetn-based networking
    
Apstra
Published By: The Relational Capital Group     Published Date: Nov 17, 2011
Groundbreaking research in customer behavior has revealed that the way humans respond to brands is simply an extension of the way they instinctively perceive, judge and behave towards one another. That insight could revolutionize your brand strategy.
Tags : 
brand, loyalty, customer, crm, retention, research, warmth, competence, relationship, purchase intent, fiske, princeton, tylenol, relational capital group, consumer behavior, psychology, product recalls, malone, kervyn, social media
    
The Relational Capital Group
Published By: Skillsoft     Published Date: Mar 27, 2015
Everyone wants to win, not everyone knows how. Winning isn’t only important for top executives but for everyone — from the boardroom to the mailroom — who wants to get ahead and help his or her organization. The two are intertwined. For an individual, winning is personal. In the business world, winning is multidimensional. The successful salesperson, for example, helps not only himself but also his company and everyone connected with it. Even the most talented businessperson with the best intentions will get nowhere unless he or she knows how to win in today’s complex business world. Business is a game, and winning that game is a total blast! Download Winning by legendary CEO, Jack Welch with Suzy Welch and learn how to be on the winning team.
Tags : 
leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers, jack welch
    
Skillsoft
Published By: NetApp     Published Date: Mar 11, 2015
Improving data backup and recovery continues to be a top priority among senior IT decision makers, as highlighted in a 2015 IT Spending Intentions survey conducted by ESG. Organizations plan to invest in modernizing data protection, including the cloud. Learn the key considerations when evaluating a cloud-extended data protection solution that provides security, efficiency, effectiveness, and risk mitigation.
Tags : 
    
NetApp
Published By: QuickPivot     Published Date: Jan 28, 2016
How do marketers appropriately identify, score, and employ behavior breadcrumbs when ever-growing complex digital paths, intentions, channels, and devices fragment our view of the customer?
Tags : 
quickpivot, cross-channel, consumer behavior, marketing attribution, marketing solutions
    
QuickPivot
Published By: Oracle     Published Date: Aug 19, 2016
In this white paper, Oracle shows its intent to compete on all fronts.
Tags : 
    
Oracle
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Consumer reviews can have an impact on sales, but did you know that negative reviews can actually improve purchase intent? The linchpin: How brands respond. Read new research about the power of responding to consumers.
Tags : 
consumer-centric, consumer engagement, brand messaging, branding, brand response, consumer conversations
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Apr 30, 2014
Negative consumer feedback creates great opportunities for brands to respond. In fact, consumers who read helpful brand responses to reviews are 186% more likely to make a purchase. Hear first-hand how brands respond in this recording.
Tags : 
consumer-centricity, consumer engagement, brand messaging, branding, brand response
    
Bazaarvoice
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.