rpo

Results 26 - 50 of 2808Sort Results By: Published Date | Title | Company Name
Published By: Silverpop     Published Date: Sep 19, 2011
10 tips for expanding your behavioral knowledge base, shaping your content and leveraging timing so you deliver the ideal message at the perfect moment, plus real-life examples of how companies have made it happen.
Tags : 
silverpop, marketing, right message, email, social media
    
Silverpop
Published By: Silverpop     Published Date: Jun 15, 2012
If your contact base doesn't continue to grow, how can you expect your business to grow? Learn how you can help expand your company's marketing database with ideas for collecting data on-site, tapping social media, driving opt-ins via transactional emails and more.
Tags : 
marketing database, silverpop, marketing, marketing campaigns, reach, customers
    
Silverpop
Published By: Silverpop     Published Date: Sep 19, 2011
With more people trying to squeeze more activities into a finite amount of time, it's no wonder that people say "time is money." And for marketers with less margin for error than ever, timing is literally money. So how do you deliver the right message at the right time and ensure your revenues don't melt away faster than a clock in a Dali painting?
Tags : 
silverpop, email, marketing
    
Silverpop
Published By: Brainshark     Published Date: Oct 16, 2013
"Getting employees to understand and take advantage of benefits during open enrollment periods is big challenge for many HR managers. This paper looks for new ideas on communicating benefit plans from professional marketers, knowledge management experts, and social media gurus."
Tags : 
human resources, training, compliance, onboarding, new hire, orientation, open enrollment, employee benefits, certification, corporate learning, lms, learning management system, tracking, communications, employee satisfaction
    
Brainshark
Published By: Spredfast, Inc.     Published Date: Oct 03, 2013
All You Need to Know to Win with Social Media Marketing
Tags : 
spredfast, blog, marketing, branding, social media marketing, corporate blogger
    
Spredfast, Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Datto shares 10 tips for MSPs to increase profit, improve visibility, and strengthen customer satisfaction -- all without breaking the bank.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware
    
Panda Security
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation
Published By: Tapinfluence     Published Date: Jun 07, 2016
By utilizing these best practices from TapInfluence, you’ll increase your brand’s credibility while building goodwill and trust with potential customers. Incorporating the expert voices of industry influencers engages your audience, highlights brand integrity, and helps further your marketing goals.
Tags : 
marketing, content marketing, best practices, business optimization, business practices
    
Tapinfluence
Published By: EMC Corporation     Published Date: Oct 16, 2013
Backup and recovery is part of business and is essential to successful information management. Take fifteen minutes to find out how you can transform backup and recovery with disk-based, deduplication-optimized solutions from EMC.
Tags : 
backup environment, emc. transformation, customer profiling, best practices, technology, storage
    
EMC Corporation
Published By: ReadyTalk     Published Date: Sep 19, 2014
59% of marketers are using webinars in their B2B content marketing strategy. While they require a significant level of effort to produce, webinars can provide a great return on investment. Fill your content pipeline by repurposing webinar assets into other pieces of content and extending the topic into other formats. Here are 19 pieces of content that can be created from every webinar.
Tags : 
webinars, qualified, leads, generation, strategy, marketing, investment, time, practices, tools, content, investment, pipeline, b2b, repurposing, topic
    
ReadyTalk
Published By: EMC Corporation     Published Date: Jun 14, 2011
Qualitative and quantitative research among AP professionals to gain insights into trends in automated data capture in invoice processing.
Tags : 
emc, accounts payable, automation, paper process, transaction costs, error rates, invoice, centralized, outsourcing, cloud computing, capital budget, costs
    
EMC Corporation
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, business technology, data center
    
Symantec
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, networking, enterprise applications, storage
    
Smarsh
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Thomson Reuters     Published Date: Feb 09, 2016
Download this report for insights from industry experts on some of the biggest corporate tax shakeups in 2015, as well as key topics to keep in mind in 2016 and what that all means for tax technology.
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, transfer pricing, beps, fatca, tax information reporting, global trade management, supply chain management, tax data management, global tax survey, indirect tax, property tax, statutory reporting, trust tax, country-by-country reporting
    
Thomson Reuters
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business technology
    
FTI Consulting
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our 2018 Annual Cybersecurity Report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months. Report Includes: * The evolution of malware, including the developments behind network-based ransomware * Tactics adversaries are using to evade detection, namely, weaponizing cloud services and other technology used for legitimate purposes * Developments in malicious encrypted web traffic * Updates on how DDoS “Burst attacks” are increasing in complexity, frequency, and duration * Recommendations for defenders
Tags : 
    
Cisco Umbrella EMEA
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Ponemon Institute is pleased to present The Value of Artificial Intelligence in Cybersecurity sponsored by IBM Security. The purpose of this research is to understand trends in the use of artificial intelligence and how to overcome barriers to full adoption.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
IBM has been named a Leader in Gartner's Magic Quadrant for Data & Analytics Services. According to the report, by 2022, 90% of corporate strategies are expected to view information as a critical enterprise asset, and analytics as an essential competency. Data and analytics service providers can help leaders accelerate and transform their ability to deliver data-driven insights and innovation solutions to businesses. Get complimentary access to Gartner's latest Magic Quadrant report for Data & Analytics Service Providers.
Tags : 
    
Group M_IBM Q4'19
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi
    
CEB
Published By: White Horse     Published Date: Mar 24, 2010
Poorly run Web site redesign RFPs are costing B2B companies significant time and budget. Get your RFP process off to the right start using proven framework that provides critical insight on a vendor's core capabilities and creativity relative to your business needs.
Tags : 
white horse, b2b, redesign, rfps, b3b, scope, purpose, template
    
White Horse
Published By: Datto Inc.     Published Date: Jan 31, 2013
This IT solutions provider’s experience with enterprise storage vendors taught his one thing; you can’t cram an enterprise storage solution into a small to midsize business.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.