Networks Social Networking SitesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Networks Social Networking Sites returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Data Security
 •   Customer Relationship Management (CRM)
 •   Customer Service (General)
 •   Customer Experience Management (CEM)
 •   Network Security
 •   Business Intelligence Solutions
 •   Customer Data Integration
 •   Collaborative Tools
 •   Endpoint Security

Related Searches
 •   Guides Networks Social
 •   India Networks Social
 •   Learn About Networks Social Networking
 •   Networks Experts
 •   Networks Reporting
 •   Networks Social Conference
 •   Networks Social Intrastructures
 •   Schemas Networks Social
 •   Skills Networks Social Networking
 •   Web Casts Networks
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risks by Oracle Corporation

July 31, 2012 - (Free Research)
Social networking sites are some of the most powerful tools available to recruiters today. If you're not sure where to start with a social recruiting strategy, this paper will outline why social recruiting is becoming an imperative for companies today, what considerations you need to be aware of, and what first steps you can take. 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 Engaging Customer Passion by SDL Web Content Management Solutions Division

July 27, 2010 - (Free Research)
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy, marketing tactics and communication plan to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves. 
(WHITE PAPER) READ ABSTRACT |

Gartner predictions around Social CRM by Infor CRM

February 08, 2012 - (Free Research)
This tip e-guide from SearchCRM.com features insight from Gartner's 2011 Magic Quadrant for social customer relationship management (CRM). Read this now to learn what challenges are cropping up in CRM, how social media is affecting CRM strategies and what the future of social CRM looks like. 
(EGUIDE) READ ABSTRACT |

The Social Business: Advent of a new age by IBM

February 16, 2011 - (Free Research)
This paper outlines the why organizations need to become social businesses today. Read on to learn how your business can become social through crafting the right blueprint relying on networks, social and real-time collaboration, mobility and integration, how to deepen your customer relationships and the benefits associated with it, and much more. 
(WHITE PAPER) READ ABSTRACT |

Maturing Your DLP Strategy for Today’s Threats by Sophos, Inc.

February 02, 2012 - (Free Research)
Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution. 
(EGUIDE) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 19, 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Sales 2.0: Tap Into Social Media to Drive Enterprise Sales Results by InsideView

August 26, 2009 - (Free Research)
Read this paper to learn how Sales 2.0 technology helps sales identify the right opportunities at the right time and determine the right people to contact. Also learn how this unique approach enables sales and marketing collaboration to drive productivity and close more deals in this increasingly connected world. 
(WHITE PAPER) READ ABSTRACT |

Readying your Portals for Social Business by IBM

August 16, 2011 - (Free Research)
Social networking, high-speed mobility and smarter devices are changing the way we do business. Read this paper now to learn how you can create value for your business through building robust social and real-time collaboration capabilities into portals. 
(WHITE PAPER) READ ABSTRACT |

A Total-Cost-of-Ownership Comparison for Unified Communications and Collaboration by Cisco (E-mail this company)

September 30, 2013 - (Free Research)
This guide compares the total-cost-of-ownership of various unified communications and collaboration platforms and explains how collaboration is critical to the success of the modern business. 
(WHITE PAPER) READ ABSTRACT |

Oracle Mobile and Social Service: The Next Step in IAM by Oracle Corporation UK Ltd

November 30, 2012 - (Free Research)
As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe. 
(WHITE PAPER) READ ABSTRACT |

BT rolls out Microsoft Sharepoint 2010 by ComputerWeekly.com

June 01, 2010 - (Free Research)
BT is to roll out Facebook-style social networking services to its 100,000 employees, in a move it says will help staff collaborate more effectively on projects, whether they are in the office or working remotely. 
(WHITE PAPER) READ ABSTRACT |

A more social contact center by Salesforce.com

March 20, 2012 - (Free Research)
In this expert e-guide, you will discover ways that contact centers are using social media channels to manage customer contact volume and the 10 steps to creating a call center social media strategy. 
(EGUIDE) READ ABSTRACT |

The Social-Powered Enterprise by Salesforce.com

February 06, 2012 - (Free Research)
This e-book is designed to help you embrace the rise of social media, to harness its power and put it to work throughout the company. It’s based on our experience helping thousands of companies put the power of social media to work. It also discusses the benefits of social-powered selling, including greater reach and better close rates. 
(EBOOK) READ ABSTRACT |

How social/collaborative approaches can build bridges in case management by IBM

November 17, 2011 - (Free Research)
In this tip guide, well-known industry analyst Neil Ward-Dutton discusses trends and best practices in social networking and collaboration for case management. Readers will learn how social/collaborative approaches can build bridges and improve service in case management. 
(EGUIDE) READ ABSTRACT |

The Future of Email and Applications is Social by IBM

February 28, 2013 - (Free Research)
The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides. 
(WHITE PAPER) READ ABSTRACT |

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators by Hewlett-Packard Company

May 31, 2012 - (Free Research)
This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack. 
(WHITE PAPER) READ ABSTRACT |

7 Steps To Getting A Handle On Social Application In Your Enterprise by Jive Software

December 31, 2013 - (Free Research)
Social media is a huge part of your employees' personal lives, so why shouldn't it be integrated into their work lives as well? While some executives might be wary of incorporating social media in the workplace, they really shouldn't be. With the right management tactics, you can get the benefits of social media while still remaining in control. 
(WHITE PAPER) READ ABSTRACT |

Advanced Identity Tracking for Social Networking Sites by Hewlett-Packard Company

May 31, 2012 - (Free Research)
This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 11, 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 21, 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

When Web 2.0 Becomes Security Risk 2.0 by Kaspersky Lab

August 19, 2009 - (Free Research)
Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk. 
(WHITE PAPER) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 10, 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

CW buyer’s guide: managing identity & access by ComputerWeekly.com

August 16, 2013 - (Free Research)
This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Social Recruiting: How to Effectively Use Social Networks by Oracle Corporation

March 20, 2014 - (Free Research)
This white paper explores the importance of developing a comprehensive social network recruiting strategy to deliver a true ROI from Facebook and LinkedIn. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts