as service

Results 4051 - 4075 of 4327Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: May 28, 2009
Organizations are drowning in content. They don't know what they have, and they can't find what they need when they need it. While they spend significant time and money to manage content stored among a host of disconnected systems, their efforts are less than fully effective.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, best practices, business analytics, business intelligence, business management, business process management
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management, best practices
    
ASG Software Solutions
Published By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : 
mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara, compliance, esg, webmail, storage capacity, storage, sales & marketing software, web services, service management, colocation and web hosting
    
Mimecast
Published By: Silverpop Engage B2B     Published Date: May 19, 2009
Smaller budgets. Fewer personnel. More pressure to show value. As the recession lingers on, B2B marketers are being called upon to deliver bigger, faster, cheaper results with less resources. But the current economic climate means even companies able to make high-dollar purchases will require more touch points to nurture them through the buying process. Today's business buyers are cautiously working to make smarter, more informed decisions.
Tags : 
silverpop, engage, roi, metrics, email marketing, opens, clicks, recession, b2b, b2c, roi, return on investment, engaging, recipient, communications, customers, prospects, customer relationship management, crm, click-through rates
    
Silverpop Engage B2B
Published By: Tippit, CRM     Published Date: May 18, 2009
Download this side-by-side comparison guide that breaks down the industry's top 15 CRM players (including Salesforce.com, RightNow Technologies, NetSuite, Microsoft, Entellium, SugarCRM and Oracle) so you can quickly and easily compare the features and costs of each. Learn more today!
Tags : 
crm, hosted crm, tippit, marketing, market, hosted, on-premise, solution, sfa, sales force automation, oracle, mobile, email marketing, cti, customer relationship management, roi, sugar, forecasting, call center, sales
    
Tippit, CRM
Published By: Ability Commerce     Published Date: May 18, 2009
It always surprises me that as eCommerce marketers we give lip service to the importance of testing, buy many of us don't take the time to fine-tune our email programs. If you are able to identify a few elements through testing that resonate with your customers and then employ those insights in your ongoing program, the improvements may be sustainable over time.
Tags : 
ability commerce, seo, email frequency, email test, lead generation, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Quocirca     Published Date: May 15, 2009
Most organisations have had to supplement their IT capability with some form of external help at one time or another. However, as financial pressures mount and technology continues to evolve and its relationship with the business becomes increasingly complex, how does this change the expectations and needs of those external relationships? Learn more today!
Tags : 
quocirca, software as a service (saas), it function, it staff, business process, customer service, it budget, it management, business process management, productivity
    
Quocirca
Published By: Tippit, CRM     Published Date: May 15, 2009
Today's Customer Relationship Management (CRM) solutions aim to recapture the personalized customer service provided by local mom-and-pop shops of yore – except with high-tech-analytics capabilities, collaborative platforms and automated processes. By gathering information from multiple data sources and storing it in a centralized location, a hosted CRM solution provides a holistic view of a customer in real time. Armed with this insight, a company’s management, sales and service people can better generate leads, target top customers, manage marketing campaigns, drive sales and boost customer satisfaction.
Tags : 
tippit, marketing, analytics, sales force automation, crm, onyx software, rightnow technologies, enterprise applications, customer relationship management, return on investment
    
Tippit, CRM
Published By: Citrix     Published Date: May 13, 2009
The traditional workforce model of permanent employees located in a single or small number of offices has undergone a significant transformation in recent years, accelerated by the effects of the current economic landscape. Drivers of this trend include initiatives to drive growth and expand into other markets, improve customer service, speed to market, improve decision-making processes, and increase both worker and overall organisational productivity.
Tags : 
citrix, virtualization, virtual workers, remote, remotely, outsource, teleworkers, business productivity, standard operating environment, soe, server virtualization, total cost of ownership, workforce management
    
Citrix
Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive, medium-size business, esg, storage, anti spam, anti spyware, anti virus, application security, policy based management, security management, security policies, web service security, email archiving
    
Mimecast
Published By: Innotas     Published Date: May 11, 2009
Discover how IT Governance enables IT to meet these expectations, measure performance, manage resources, mitigate risk and make sure that IT aligns activities with the strategic direction of the enterprise - all for a surprisingly low cost.
Tags : 
innotas, it governance, enterprise services, it management, strategy, accountability, cost saving, business intelligence, business activity monitoring, business management, project management
    
Innotas
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs, international computing
    
VeriSign Incorp.
Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service, ip network, data center, unified communications, internet engineering task force’s, ietf’s, enterprise applications, data center design and management
    
Genesys
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies, data management, customer interaction service, customer relationship management, customer satisfaction
    
Catapult
Published By: BlackBerry     Published Date: Apr 20, 2009
Ricoh Americas Corporation (Ricoh) is a provider of document solutions, including digital imaging systems, fax machines, printers, scanners and data storage. Ricoh wanted a solution to automate service calls handled by field service technicians. They decided to create an application for the BlackBerry solution that would improve call efficiency and give technicians more control over the tasks performed during their day.
Tags : 
blackberry, ricoh, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones, wireless security
    
BlackBerry
Published By: IBM     Published Date: Apr 17, 2009
Optimize IT process, maximize ROI and improve service levels. The challenge facing businesses today is the need to achieve ever-higher levels of service and maximize return on investment, while simultaneously minimizing costs. This white paper reveals how IBM Maximo® asset and service management solutions help your organization run more efficiently.
Tags : 
ibm maximo, asset and service management solution, optimize it, maximize roi, service lebels, service management solutions, tivoli, it business processes, service levels, ibm, service level agreements slas, key perfor¬mance indicators, kpis, it asset management, itam, it infrastructure library, itil, it asset management, itam, work management
    
IBM
Published By: IBM     Published Date: Apr 17, 2009
Optimize IT process, maximize ROI and improve service levels. The challenge facing businesses today is the need to achieve ever-higher levels of service and maximize return on investment, while simultaneously minimizing costs. This white paper reveals how IBM Maximo® asset and service management solutions help your organization run more efficiently.
Tags : 
ibm maximo, asset and service management solution, optimize it, maximize roi, service lebels, service management solutions, tivoli, it business processes, service levels, ibm, service level agreements slas, key perfor¬mance indicators, kpis, it asset management, itam, it infrastructure library, itil, it asset management, itam, work management
    
IBM
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca), server gated cryptography, sgc, certificate management, certificate-revocation list, crl, international computing
    
VeriSign Incorp.
Published By: Stratus Technologies     Published Date: Apr 14, 2009
Has the economic meltdown taken its toll on your business? Is the endless onslaught of bad news making it difficult to maintain a positive perspective? The good news is that despite the economic downturn, there’s never been a better time to raise the bar for your IT capabilities. Mature virtualization solutions, new affordable uptime solutions, powerful integrated capabilities and an increased focus on operational simplicity all enable businesses like yours to enhance IT operations — without biting off too much of your budget. Here are five things you can do immediately and affordably to add value to your business.
Tags : 
stratus, cost cutting, it costs, it infrastructure, it capabilities, budget, economics, economic downturn, service levels, slas, x86 servers, five-nines service levels, ftscalable storage, virtualization, mission-critical operations, vmware environments, small-to-medium businesses (smbs), remote it environments, stratus avance, it operations
    
Stratus Technologies
Published By: Quocirca     Published Date: Apr 08, 2009
Monitoring, measuring and reporting on the financial health of an organisation is a basic need that requires effective tools and processes to optimise the end result. Underpinning this is the requirement for planning capabilities, utilising scenario and what if analysis with simulations and other forward looking capabilities. The new primary research presented in this report shows that most organisations still have much to do.
Tags : 
quocirca, oracle, monitoring, measuring, reporting, financial health, compliance, epm, soft-touch, governance, business intelligence, epm index, financial services authority, merger and acquisition, m&a, key performance indicators, kpis, enterprise applications
    
Quocirca
Start   Previous    156 157 158 159 160 161 162 163 164 165 166 167 168 169 170    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.