> Home

listing

Results 1 - 25 of 54Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Aug 17, 2017
Managing the PC life-cycle environment can be a complicated and expensive process. Enterprises with old and outdated systems require increased support, have higher maintenance costs, and see interrupted workforce productivity. However, consolidating processes and enlisting the help of vendor partners will greatly reduce costs and provide expert-level knowledge for a better PC life-cycle management operation. In April 2016, Dell commissioned Forrester Consulting to conduct a study with 230 IT decision-makers with knowledge of desktop infrastructure environments at their organization. All respondents were significantly involved in the decision-making process for PC and device management and had significant expert-level knowledge about the PC life-cycle process.
Tags : 
pc lifecycle, desktop infrastructure, pc lifecycle management, workforce productivity, it management
    
Dell
Published By: Advertising.com Sponsored Listings     Published Date: Dec 12, 2011
Advertising.com's premium sponsored listings network gives you an unmatched ability to target your text ads by site, section, or page on the web's most popular sites.
Tags : 
cpc, advertising.com, text ads, contextual ads, contextual advertising, search ads, search advertising, interactive marketing, website/graphic design, business intelligence
    
Advertising.com Sponsored Listings
Published By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web ó from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the ďsilent majority,Ē while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"If youíre an online retailer, youíre already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giantís influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazonís ever-evolving trends and requirements, you must also to take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, weíll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more. "
Tags : 
    
ChannelAdvisor
Published By: Uberall     Published Date: Oct 08, 2018
Are you setting your business up for success? Follow this checklist to be sure you are optimizing your online presence across all possible platforms.
Tags : 
seo, media, listing, local, social, customers
    
Uberall
Published By: Uberall     Published Date: Oct 08, 2018
Did you know that for 88% of shoppers, the first step to a local purchase is often an online search? If you want customers to find you, you must have a consistent, rich and engaging online brand that is equally optimized for both desktop and mobile SEO, and that contains long tail keywords for voice search assistants like Siri, Alexa, Cortana, and Google Voice. Be sure to claim and regularly maintain your listings for every widely used portal and social site, and create a separate locator page for every single locationóso that you show up at the top of all local searches.
Tags : 
mobile, shoppers, customers, seo, uberall, local marketing, location marketing, near me searches
    
Uberall
Published By: LogMeIn     Published Date: Oct 08, 2015
This report defines the recommended technology stack for field services, as well as listing the top-installed vendors in each technology category.
Tags : 
field services, technology, automation for field services, mobile computing, mobile data systems, business process automation, customer interaction service, customer relationship management, customer satisfaction, customer service, crm solutions/software, customer experience/engagement
    
LogMeIn
Published By: LogMeIn     Published Date: Oct 08, 2015
This report defines the recommended technology stack for field services, as well as listing the top-installed vendors in each technology category.
Tags : 
video collaboration, technology stack for field services, technology, field services, technology, on-demand, byod, real-time support, video collaboration, application integration, customer interaction service, customer relationship management, customer satisfaction, customer service, video conferencing, online video marketing
    
LogMeIn
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security, printer security, automotive system security, aeronautical system security, pci dss, nerc, dynamic whitelisting, zero day attacks, anti spam, anti spyware, anti virus, application security, security management
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting, anti spam, anti spyware, anti virus, application security, auditing, compliance, hacker detection
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"Amazon is the land of plenty. Itís easy to see why more consumers start their online product searches on Amazon than Google. But with so many moving pieces to the Amazon puzzle, itís important to step back and see where your listings stand from your consumerís point of view. How does the results page break down? Do your products stand out? Or are they easy to miss? Most important, do your products even show up? In this eBook, weíll break down the main components of the Amazon results pages and what they mean for retailers, including: - Amazon search results - Amazon Buy Box - Advertising on Amazon"
Tags : 
ecommerce, retail, amazon, advertising, selling online, online shopping, online advertising, marketing, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"There are millions of retailers and branded manufacturers on Amazon, selling billions of products annually. That means listing your products and waiting for sales to roll in doesnít work anymore. If youíre on Amazon, you need to stand out. In this eBook, weíll walk you through everything you could want to know about Sponsored Products, why sellers are using it and how to leverage the program to stand out among the billions of products on Amazon. Weíll also answer some of the questions we often hear about the popular program (and some questions we havenít heard but think you may be curious about)."
Tags : 
ecommerce, retail, amazon, advertising, selling online, online shopping, online advertising, marketing, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"To consumers, Amazon is a land of plenty. A place where you can find anything. Itís easy to understand why shoppers start more than half of their online product searches on Amazon ó and why more than 100 million people pay for premium Prime memberships to unlock access to exclusive deals. As the marketplace thatís set the standard for remarkable ease in browsing and buying, Amazon serves up millions of indexed search results to purchase ready shoppers every single day. Thatís why itís so important to step back and see where your listings stand from your consumerís point of view. How does the results page break down? Do your products stand out? Or are they easy to miss? Most importantly, do your products even show up? In this eBook, we break down the essential components you need to address to get your products ready to compete for page one search results: - Your product data - The Amazon Buy Box - Amazon advertising"
Tags : 
    
ChannelAdvisor
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, storage, bandwidth management, anti spam, return on investment
    
Secure Computing
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET
Published By: Lumension     Published Date: Mar 30, 2011
Download this Lumension white paper from Web Buyer's Guide to learn the best defense against malware is intelligent whitelisting
Tags : 
lumension, anti-virus software, malware, intelligent whitelisting, blacklisting, point of sale terminal, ecommerce server, atm machine, anti spam, anti spyware, anti virus
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, access control, anti spam
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management, compliance, encryption, network security appliance, security management, vulnerability management
    
Lumension
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection, access control, anti spam, anti spyware, anti virus, application security, authentication, email security, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
Globalsign Inc.
Published By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam, anti spyware, anti virus, application security, encryption, firewalls, intrusion detection, intrusion prevention
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features, security, enterprise applications
    
McAfee
Published By: Yext     Published Date: Sep 03, 2014
In the Local SEO biz, we spend a lot of time dealing with duplicate business listings. Duplicate records of your business appearing throughout the Local Search ecosystem are bad news for a variety of reasons, not the least of which is they could be costing your business a lot of time and money. As an industry, it, behooves us to collectively solve this issue. So letís give it a shot.
Tags : 
yext, seo, marketing, search engine optimization, duplicate business listings, local search, local search ecosystem, seo best practices, dupe listings, multiple listings, search marketing, search marketing agencies, web analytics, customer experience/engagement
    
Yext
Start   Previous   1 2 3    Next    End
Search Home