Email MeasuresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Email Measures returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Customer Relationship Management (CRM)
 •   Enterprise Data Protection and Privacy
 •   Technology ROI Tools
 •   Customer Service (General)
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Marketing Management

Related Searches
 •   Automate Email
 •   Building Email Measures
 •   Calendar Email Measures
 •   Communication Email Measures
 •   Email Disk
 •   Email Measures Nevada
 •   Email Measures Printable
 •   Email Measures White Papers
 •   Email Network
 •   Schedule Email Measures
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Today's New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them by FireEye

December 31, 2013 - (Free Research)
This guide explores how email-based cyber-attacks aim to subvert your security tools and steal your valuable business data. 
(WHITE PAPER) READ ABSTRACT |

Fortune 200 Firm Achieves Global Email Protection by WatchGuard Technologies, Inc.

March 15, 2011 - (Free Research)
Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200. 
(CASE STUDY) READ ABSTRACT |

Security - Three Necessary Security Measures to Empower Data Center Transformation by Cisco Systems, Inc.

July 12, 2013 - (Free Research)
Access this informative white paper that presents three must-have security measures to empower data center transformation to virtualization and the cloud. 
(WHITE PAPER) READ ABSTRACT |

About to Buy Guide: Spam/virus protection for Exchange by Mimecast

June 05, 2012 - (Free Research)
This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high. 
(EGUIDE) READ ABSTRACT |

Multi-Channel Contact Center Metrics for Analyzing Customer Satisfaction by Five9

March 14, 2014 - (Free Research)
This exclusive e-guide discusses the contact center metrics necessary to measure customer experience across multiple channels, including: chat, communities, email, social media, text messaging, and more.  Also, get an in-depth look at social media channels and how to avoid the top five pitfalls of social media in the contact center. 
(EGUIDE) READ ABSTRACT |

New Contact Center Metrics to Fit Busy New Customers by Aspect

March 14, 2014 - (Free Research)
View this exclusive e-guide to learn more from Fluss and other CRM experts as they explore the right and wrong way to leverage mobility to reach busy customers, as well as how to implement new contact center metrics to measure the effectiveness of new channels -- including email, chat, and social media. 
(EGUIDE) READ ABSTRACT |

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner by Perimeter eSecurity

November 03, 2011 - (Free Research)
Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter. 
(CASE STUDY) READ ABSTRACT |

The Best Best Practice Guide: Benchmarking for Service Desk Success by GoToAssist

November 30, 2010 - (Free Research)
Benchmarking is a critical process for any Service Desk that wants to gauge the quality of their service delivery. Too often, however, desks are overly concerned with industry benchmarks and hitting industry standards for call waiting times, resolution time and the perennial cost per email. Download the SDI best practices guide to learn more! 
(WHITE PAPER) READ ABSTRACT |

B2B Collaboration: Assessing the ROI of Process Integration Business Value Research Series by Sterling Commerce Manufacturing Solutions

March 2008 - (Free Research)
Business and IT leaders are under increasing pressure to improve B2B collaboration and the electronic communication capabilities of their organizations. This report looks at the key drivers for B2B collaboration in both the purchase-to-pay and... 
(WHITE PAPER) READ ABSTRACT |

Why Most Organizations Miss User Response Monitoring - and What to Do about It by Nimsoft, Inc.

August 2008 - (Free Research)
This guide explains the challenges of user response monitoring and how to overcome these challenges. It also teaches you how to get a real handle on infrastructure performance and shows you how it will impact user experience. 
(WHITE PAPER) READ ABSTRACT |

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by Websense, Inc.

July 2011 - (Free Research)
Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security. 
(WHITE PAPER) READ ABSTRACT |

Web Security Solutions by Websense, Inc.

November 2008 - (Free Research)
Read this whitepaper to learn ways to implement industry-leading URL filtering with extensive security capabilities that continuously watch the organization's assets for malicious activity and prevent them from being used in fraudulent attacks. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Top 5 Best Practices for Creating Effective Campaign Dashboards by Tableau Software

June 2008 - (Free Research)
We can define an effective marketing dashboard as one that enables marketers to visually display relevant and current campaign, customer, advertising and/or branding information needed to achieve marketing objectives. 
(WHITE PAPER) READ ABSTRACT |

From Cold to Hot: Lead Nurturing Programs That Generate Sales by Vtrenz, Inc

August 2008 - (Free Research)
This white paper explains the importance of lead nurturing–in the lead management process. It discusses best practices for nurturing leads in today's competitive business environment, and offers advice for implementing a lead-nurturing program. 
(WHITE PAPER) READ ABSTRACT |

Virtualizing Microsoft® Exchange Server 2007 on Dell™ Systems Running Microsoft Windows Server® 2008 Hyper-V™ by Dell and Microsoft

April 2009 - (Free Research)
In this paper, various configurations of Exchange Server 2007 are tested in physical and virtual environments to evaluate the performance scalability and to understand the sizing requirements for Exchange Server 2007 in a virtualized environment. 
(WHITE PAPER) READ ABSTRACT |

Smart Devices, Smart Security by Voltage Security, Inc.

July 2012 - (Free Research)
This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.

February 2008 - (Free Research)
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more. 
(WHITE PAPER) READ ABSTRACT |

ITIL: What It Is and Why You Should Care by Global Knowledge Network, Inc.

September 2005 - (Free Research)
ITIL is becoming the next big thing in Information Technology. This paper outlines the origin of ITIL, who controls its contents, who are the biggest users, and why you should care. 
(WHITE PAPER) READ ABSTRACT |

Measuring Community Health with Indicee Analytics by Indicee

March 2014 - (Free Research)
The e-book provides examples of what to measure to ensure healthy, engaged communities, and how to measure it using analytics. Also included is a re-cap of the location for the full framework. 
(EBOOK) READ ABSTRACT |

How to tie learning to business impact by ComputerWeekly.com

December 2010 - (Free Research)
Many organisations implement “learning engagements,” or training programmes, to increase employee satisfaction, realise better team performance, and improve communication. 
(WHITE PAPER) READ ABSTRACT |

How Does your Service Measure Up? Getting to Grips with Metrics by GoToAssist

July 2011 - (Free Research)
This quick guide will identify some of the most popular metrics that you should be measuring, look at ways in which you can measure them, and how to utilize these measures to improve your service delivery. 
(WHITE PAPER) READ ABSTRACT |

Measuring the Business Impact of Support by Citrix Online UK

July 2010 - (Free Research)
Customer support has long been a business mainstay. Yet, the business impact of support is seldom measured - despite the influence of support on higher revenue, customer satisfaction and increased productivity. This new ServiceXRG white paper explores the importance of quantifying the impact of support on your business. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Why your clients should measure their data center energy efficiency by Intel

February 2011 - (Free Research)
Read this E-Guide to learn more about why measuring data center efficiency is important for your clients and what exactly they should be measuring. 
(EGUIDE) READ ABSTRACT |

Enterprise VoIP Security: Potential Threats and Best Practices by Global Knowledge Network, Inc.

March 2006 - (Free Research)
As VoIP usage becomes widespread, enterprise users will become subject to many of the same security risks that have affected data networks. This report highlights some of the potential security problems associated with VoIP and address what measures can be taken to secure enterprise VoIP deployments. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts