HIT Consultant Insightful coverage of healthcare innovation
 

cia

Results 6226 - 6250 of 6469Sort Results By: Published Date | Title | Company Name
Published By: Wayin     Published Date: Jun 08, 2015
The 2015 Waying Real-Time Marketing Report: Making Real-Time Moments Matter is a first-of-its-kind research study aiming to provide the marketing industry with a quantitative baseline for real-time marketing strategy, execution and trends as currently practiced by major brands. In surveying 200 marketing professionals, Director level and above, who are currently practicing real-time marketing at companies with $100 million in revenue or more, the study drives home the understanding that effective real-time marketing cannot consist of a string of sporadic actions. Instead it requires a carefully planned strategy with the resources to discover the right trends, audiences, and content and target them with meaningful marketing experiences at the time.
Tags : 
contextual marketing, marketing strategy, brand monitoring, real-time marketing, social intelligence, social media marketing strategy, real-time marketing strategy, social media marketing
    
Wayin
Published By: Wayin     Published Date: Dec 11, 2015
This report aims to provide the marketing industry with a quantitative baseline for real-time marketing strategy, execution and trends as currently practiced by brands
Tags : 
wayin, social media marketing, real time marketing, branding, consumers, interactive
    
Wayin
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Published By: WayUp     Published Date: Dec 22, 2015
There are a number of misconceptions floating around about college students that may cause employers to pass over their applications. Pop culture depicts college students as lazy, irresponsible, and unreliable, yet we have found they’re an extremely beneficial addition to any growing business. Download this whitepaper to learn the top four reasons college students are the best hires for part-time positions.
Tags : 
college students, part-time workers, part-time hires, recruitment, technology, millennials
    
WayUp
Published By: WebEx     Published Date: Dec 14, 2007
With the growing array of hardware, software, and systems necessary to support businesses, today more than ever, software-as-a-service or on-demand solutions offer feature-rich, real-time functionality without the burden associated with deploying, managing and supporting an in-house approach.  See if it’s right for you.
Tags : 
service management, saas, software as a service, customer service, smb, small business, soho, midsize
    
WebEx
Published By: Webroot     Published Date: Nov 02, 2012
When IT administrator, Ty Smith deployed SecureAnywhere Business - Endpoint Protection, system wide, it quickly became clear that he had made the right choice, both from a security standpoint and a financial one.
Tags : 
endpoint security, endpoint protection, malware protection, antivirus software, case study
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media, malware, block, network
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection
    
Webroot Inc
Published By: Webroot UK     Published Date: Mar 22, 2010
The web today is a prime vector for attack. Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today's financially motivated hackers.
Tags : 
webroot, web security protection, hackers, web threats, cloud computing, malware
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
    
Webroot UK
Published By: Webroot UK     Published Date: Aug 07, 2013
Mobility is one of the driving factors for all business and IT initiatives. IDC has characterized it as one of the four pillars of computing’s next dominant platform, along with social media, Big Data and cloud services. Mobility has the potential to dramatically enhance business agility, improve employee productivity and enable major shifts in the way individuals and businesses approach work.
Tags : 
mobile, security, small business, midsize business, improve employee productivity, business agility
    
Webroot UK
Published By: Websense     Published Date: Sep 27, 2010
Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.
Tags : 
websense, social network, facebook, linkedin, twitter, data risk, data security, web security
    
Websense
Published By: Webtrends     Published Date: Jun 02, 2010
To succeed in mobile marketing, analytics must play a crucial role in the development of strategy and prioritizations of marketing spend. But this rigor isn't being consistently applied to this rapidly growing, emerging channel.
Tags : 
webtrends, mobile strategy, digital marketing, process, customer experience, multi-channel marketing, business intelligence, customer intelligence
    
Webtrends
Published By: Webtrends     Published Date: Dec 19, 2009
According to Forrester, 48% of marketers need help demonstrating ROI on testing. Join Casey Carey, VP of Product and Bob Garcia, Director, Product Marketing and discover how to get ahead of the curve with the business-case answers they provide in this webinar.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, optimization, testing, site
    
Webtrends
Published By: Webtrends     Published Date: Jan 21, 2010
This is a must-see webinar if you want to understand the fundamentals of multivariate testing (MVT), segmentation, and content targeting. Join Bob Garcia, Director of Product Marketing Optimize and Frans Keylard, Director of Optimization as they use real-life examples to explain multivariate testing and teach you where and how to start optimizing.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, mvt, segmentation, optimization
    
Webtrends
Published By: Webtrends     Published Date: Jun 13, 2011
All that data from the web, social and mobile, but how do you get actionable insight? Download tips and stories from John Lovett and Webtrends so you can create a culture of measurement in your company.
Tags : 
webtrends, digital marketing, web analytics, business intelligence, customer intelligence, social media, data overload, mobile analytics
    
Webtrends
Published By: Webtrends     Published Date: Jun 13, 2011
Awareness, conversion, retention. As a marketer, your job hasn't changed, but the digital ecosystem changes fast. In this whitepaper from the CMO Council, top marketing execs discuss digital challenges and the resulting opportunities. Sponsored by Webtrends.
Tags : 
webtrends, cmo, international, digital marketing, process, partnerships, go-to-market, customer experience
    
Webtrends
Published By: Webtrends     Published Date: Jun 20, 2011
Marketers, managers and technologists all need real-time performance insights at their fingertips. Webtrends invites you to experience the award-winning Analytics 10, unified analytics uniquely made for digital marketing professionals in this webinar featuring Logitech and 3M.
Tags : 
webtrends, cmo, digital marketing, process, partnerships, go-to-market, customer experience, multi-channel marketing
    
Webtrends
Published By: Webtrends     Published Date: Aug 05, 2011
Improving annual revenue through organic growth is increasingly a top goal for organizations. This Aberdeen research shows that despite economic pressures, best-in-class companies, including Webtrends customers, are able to demonstrate clear value from their marketing campaigns.
Tags : 
webtrends, multi-channel marketing, website analytics, business intelligence, crm, facebook, social media, mobile measurement
    
Webtrends
Published By: Wheelhouse     Published Date: Aug 09, 2013
It’s long been the conventional wisdom that you could save your company money – and make yourself look good – by suggesting a switch from a traditional business phone system to a VoIP system. The reality, though, is less clear-cut. If you have to buy a new system because you’re expanding or moving, VoIP will be both cheaper and more capable than a traditional solution. But if you have a traditional system that is partly or fully paid for, there’s no guarantee that the financial payoff from investing in a new VoIP solution, as opposed to keeping your existing system, will be as impressive as the conventional wisdom suggests.
Tags : 
business, voip, buyer's guide
    
Wheelhouse
Published By: Wheelhouse     Published Date: Aug 09, 2013
Unified Communications, or UC, has no official or even widely accepted definition. Pundits, analysts and journalists all have their own descriptions. So do vendors – theirs just happen to fit their own products perfectly. But this lack of consensus doesn’t mean the term is meaningless. In fact, unified communications is a complex but very real phenomenon. And this phenomenon has the potential to radically improve businesses’ ability to communicate.
Tags : 
unified communications, communications
    
Wheelhouse
Start   Previous    243 244 245 246 247 248 249 250 251 252 253 254 255 256 257    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.