customer transactions

Results 51 - 75 of 86Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 11, 2016
Companies rely on an expanding set of applications to compete in today's rapidly evolving business environment: - They rely on a fast-growing array of applications and devices (email, collaboration tools, and smartphones/tablets) to communicate and conduct business with customers and business partners. - They are creating, collecting, and repurposing large, unstructured data sets in life sciences, geophysics, media, and manufacturing. - They are collecting, storing, and analyzing more social and sensor-generated data about environments, products, customers, and transactions. The promise of better and faster data-driven decision making based on all this information is pushing big data and analytics (BDA) technology to the top of executive agendas. To succeed, CIOs must place a laserlike investment focus on datacenter solutions that allow them to deliver scalable, reliable, and flexible infrastructure for fast-growing BDA environments. Read more to learn how!
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: CradlePoint     Published Date: May 17, 2016
This global corporation of quick service restaurants has about 17,500 locations serving millions of customers each day with concepts including popular pizza, chicken, and Tex-Mex chains. Most of the restaurants are on a wired network with Cisco routers, the main function of which is to process credit card purchases. With so many transactions taking place every day, the corporation decided to invest in a wireless failover system to guarantee uninterrupted connection. After careful consideration, the corporation chose Cradlepoint to provide “four-nines” (99.99% or better) connectivity via 3G/4G/LTE or wireless backup. - See more at: https://cradlepoint.com/success_stories/quick-service-restaurant-chain#sthash.ODr3J5uT.dpuf
Tags : 
    
CradlePoint
Published By: IBM     Published Date: May 02, 2016
A good customer experience drives positive word-of-mouth advertising—while a bad one can harm your brand. That's why it's so critical to quickly take steps to understand the experience of customers who are transacting online.
Tags : 
ibm, conversion, adoption, customer experience, online transactions, word of mouth, brand, enterprise applications
    
IBM
Published By: Recurly     Published Date: Mar 07, 2016
Subscription businesses have often been referred to as the holy grail of business because of the recurring revenue generated from customers. However managing day-to-day billing transactions can be daunting for business owners who typically resort to building their own billing solution. The better approach is to choose a recurring billing management service. Here are 6 reasons why outsourcing your recurring billing management might be a better solution.
Tags : 
recurly, outsourcing, outsourcing recurring billing, best practices, subscription businesses, billing transactions, billing solutions, billing management service
    
Recurly
Published By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : 
cloud computing, cisco, contact center, best practices, cloud network, storage management, data integration, data quality
    
Cisco
Published By: CrowdTwist     Published Date: Dec 02, 2015
This e-book offers 41 loyalty marketing ideas to help you keep customers engaged with your brand beyond transactions and develop more rewarding relationships.
Tags : 
crowdtwist, customer loyalty, social media marketing, brand awareness, mobile marketing, customer experience, customer interaction service, customer satisfaction
    
CrowdTwist
Published By: Dell EMC     Published Date: Oct 08, 2015
To compete in this new multi-channel environment, we’ve seen in this guide how retailers have to adopt new and innovative strategies to attract and retain customers. Big data technologies, specifically Hadoop, enable retailers to connect with customers through multiple channels at an entirely new level by harnessing the vast volumes of new data available today. Hadoop helps retailers store, transform, integrate and analyze a wide variety of online and offline customer data—POS transactions, e-commerce transactions, clickstream data, email, social media, sensor data and call center records—all in one central repository.
Tags : 
    
Dell EMC
Published By: Symantec     Published Date: Oct 01, 2015
Best-of-breed SSL certificates reassure businesses and customers about the security and the ease of conducting transactions over the Internet. Ideally, SSL Certificates form an integral part of a company's overall IT strategy.
Tags : 
ssl certificates, business and customer security, it strategy, privacy and safety, security
    
Symantec
Published By: IBM     Published Date: Sep 08, 2015
Please join us for an in-depth discussion of the latest data and analytics capabilities that banks are using today to uncover new customer insight - at the individual level - to improve offers and cross sell, optimize campaigns and deliver profitable revenue. The discussion will explore how leading banks are employing predictive analysis on customer data not often analyzed - like individual transactions, interactions, behavior and social media. See how banks can move beyond traditional segmentation and enable marketing to the "Segment of One."
Tags : 
banking, finance, customer engagement, analytics, insights, segmentation, data management, personal finance
    
IBM
Published By: IBM     Published Date: Jul 22, 2015
Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
productivity, customer service, automation, automated financial transactions, compliance, customer retention, customer satisfaction, best practices
    
IBM
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent, security
    
Symantec
Published By: IBM     Published Date: Mar 18, 2015
View this ebook to learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
customer service, productivity solutions, customer-centric banking environment, automated financial transactions, ibm, investing, finance
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Top performing organizations search for a single solution that enables them to process, monitor, and report their customers' financial transactions. The results are improved profit margins, compliance, and satisfied customers. This Aberdeen report identifies the problems facing financial institutions today, the technology they adopt, as well as the benefits of a single, central solution.
Tags : 
ibm, customer service, automated financial transactions, financial institution solutions, customer's financial transactions, investing, finance
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Why strong, effective security can and should both enhance the customer experience and lower operational costs.
Tags : 
customer experience, holistic fraud prevention, operational costs, increased transactions, fraud identification, security, it management, enterprise applications
    
IBM
Published By: Thawte     Published Date: Oct 06, 2014
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl certificates, application, web server, sensitive information, customer confidence, ssl
    
Thawte
Published By: IBM     Published Date: Jul 07, 2014
Forrester states that businesses today struggle to understand and leverage the tools necessary to create and manage unified, multichannel Digital Customer Experiences across multiple touchpoints including, web and mobile experiences for customer transactions and mobile applications. Read this report to understand how IBM's Digital Experience software is delivering solutions for the emerging Digital Customer Experience platform and integrating best-of-breed components into software offerings that manage multiple facets of the Digital Customer Experience.
Tags : 
ibm, forrester, digital, customer experience, platforms, integration
    
IBM
Published By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : 
docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
    
DocuSign
Published By: IBM     Published Date: Dec 06, 2013
Partners and customers expect instantaneous response and continuous uptime from data systems, but the volume and velocity of data make it difficult to respond with agility. IBM PureData System for Transactions enable businesses to gear up and meet these challenges.
Tags : 
ibm, ibm puredata system, data, data mangement, database, integration, transactions, workload
    
IBM
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : 
banking, financial services, credit unions, bandwidth management
    
E-SignLive by Silanis
Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Contact centers have long played a vital role in the insurance industry. Prospects and customers use them to get product information and quotes and then submit applications. Insurance agents and advisors rely on contact centers to tap into expertise and handle business and technical issues. Policyholders and members make inquiries or changes to their policies, or conduct financial transactions. Claimants call in to report accidents and check on the status of their claims. The list could go on, but the meaning is clear. Contact centers are major contributors to many key parts of the insurance business, especially the parts that require direct interaction with customers or agents. As a result, contact centers now play a critical role in an insurer’s journey toward becoming more customer-centric.
Tags : 
interactive intelligence, contact centers, insurance industry, prospects, customers, product information, quotes, members
    
Interactive Intelligence
Published By: Thawte     Published Date: Aug 08, 2013
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, networking, security
    
Thawte
Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk, application security, mobile data systems
    
HP - Enterprise
Start   Previous    1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.