point service

Results 1 - 25 of 221Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 05, 2014
When mobile is done right, businesses reap the benefits. Companies using mobile analytics see an 11.2% increase in marketing ROI compared to a 15.9% decrease for companies that don’t. The Aberdeen Group report, Mobile Analytics: Precision Marketing across Mobile Touch-Points, provides insights into better mobile strategies. Read the report to see how incorporating analytics into your mobile marketing strategy will: • Increase brand awareness • Raise your return on marketing investments • Boost average order value • Improve time-to-market of products and services
Tags : 
mobile analytics, precision marketing, mobile touch-points, mobile analytics
    
Adobe
Published By: Adobe_Edelman     Published Date: Jun 07, 2017
With the explosion of touch points and ways to communicate, the public today is more connected than ever before with the government. The transformation for your own agency can begin right now. We’ve created this roadmap for understanding what best practices exist and how we can surprise and delight your users with new digital services. You’ll also learn new strategies to help put your agency on the path to digital transformation, as well as practical tips for getting the job done.
Tags : 
adobe, customer experience, mobile-friendly service, digital growth, public sector
    
Adobe_Edelman
Published By: Aimia     Published Date: Mar 25, 2014
Identify the most important inflection points along your customer journey from curious newcomers to brand loyalists. In this Retail Brief, learn the 10 most important loyalty moments of truth — and offer a few guidelines for getting them right.
Tags : 
aimia, inflection points, marketing, customer loyalty, customer interaction, loyalty program. post-purchase service, interaction data, purchase cycle, business insights, customer interaction service, customer relationship management, customer satisfaction, customer service
    
Aimia
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Amazon Web Services has a long history of successfully supporting Microsoft workloads, with hundreds of thousands of customers across a wide variety of industries running their Microsoft workloads on AWS. Customers have successfully deployed virtually every Microsoft application available on the AWS Cloud, including (but not limited to) Microsoft Office, Microsoft Windows Server, Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft Skype for Business, Microsoft Dynamics products, and Microsoft Remote Desktop Services. This guide covers the benefits of moving Microsoft workloads to the Cloud and how to get started.
Tags : 
cloud, amazon, web services, microsoft, security, customer success
    
Amazon Web Services
Published By: Amazon Web Services, Inc     Published Date: Sep 16, 2013
Deploy a Microsoft SharePoint 2010 server farm on the Amazon Web Services (AWS) Cloud in 6 simple steps. Save money on IT infrastructure costs with no long term commitments. Learn how with our planning and implementation Guide, which also includes deployment tools, templates, and a video tutorial. Download Today!
Tags : 
aws sharepoint, enterprise sharepoint, microsoft sharepoint, microsoft sharepoint download, microsoft sharepoint online, microsoft sharepoint solutions, ms sharepoint, ms sharepoint services, online sharepoint, portal sharepoint, sharepoint, sharepoint application, sharepoint collaboration, sharepoint enterprise, sharepoint enterprise cal, sharepoint enterprise trial, sharepoint implementation, sharepoint installation, sharepoint integration, sharepoint microsoft
    
Amazon Web Services, Inc
Published By: Amazon Web Services, Inc     Published Date: Nov 21, 2013
Watch this on-demand webinar to learn the steps and available tools necessary to design, setup, and deploy infrastructure to run a multi-server Microsoft SharePoint Server Farm on AWS. Solution Architect Ulf Schoo will cover how to architect for high availability and provision the relevant AWS services and resources to run SharePoint Server workloads at scale on the AWS Cloud. Also included with the video is the Microsoft SharePoint Server on AWS: Reference Architecture Whitepaper.
Tags : 
aws sharepoint, sharepoint hosting, sharepoint server, sharepoint server farm, enterprise sharepoint, sharepoint webinar, sharepoint cloud, sharepoint migration, sharepoint solutions, amazon sharepoint, aws whitepaper, sharepoint applications, sharepoint workloads, online sharepoint hosting, it management, knowledge management, data management, infrastructure, web service management, cloud computing
    
Amazon Web Services, Inc
Published By: Avaya     Published Date: Nov 21, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: Avaya     Published Date: Nov 27, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA
Published By: Badgeville     Published Date: Feb 13, 2014
Game applications in business result in both long and short-term success. Short-term effects will occur quickly, while proper implementation and use of game psychology will enable business leaders to maintain this success in the long-term. Gain valuable insights into both long and short-term gamification success from these industry visionaries, and learn how to harness the power of games to fundamentally change the nature of work.
Tags : 
gamfiication, gamify, engagement, bunchball, gigya, big door, loyalty, productivity, learning, salesforce, sales, crm, oracle, sharepoint, support, service, compliance, adoption, game, customer interaction service
    
Badgeville
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing, collaboration
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
    
Blue Jeans Network
Published By: BMC ESM     Published Date: Aug 20, 2009
What if you could predict disruptive IT events and automate their resolution — all before they disrupt your business?  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Assurance from BMC Software.
Tags : 
service assurance, bmc, it events, it automation, software demo, automate, it management, enterprise applications, business process automation, business process management, system management software, service management
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching, provisioning, compliance, manual task, business process automation, international computing
    
BMC ESM
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem, sdlc, mttr
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Effective Competition Depends on Continuous Delivery of Quality Software In today’s application economy every company is a software company, no matter what industry it is in: • Shipping companies depend on logistics software to efficiently route packages, arrange drivers and automate warehouses. • Retail companies rely on software to manage inventory, engage with customers online and to give in-store associates the tools they need to answer customer questions on the spot. • Marketing firms lean on applications to gather consumer data and parse it, automate communication with prospects and effectively manage advertising campaigns. The examples are endless. The point is that in order to compete today, every business must be able to quickly build and tweak software to adjust to always evolving market demands. Ultimately, business success depends on faster development iterations while still maintaining the high quality of service expected by customers, stakeholders and end users.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Défi Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique. Solution Connaître vos utilisateurs privilégiés, c’est connaître vos risques. Les outils de gestion des accès à forts privilèges doivent eux-mêmes être en mesure de supporter l’automatisation du processus d’autorisation et permettre l’évolutivité grâce à la prise en charge des opérations dynamiques et de l’infrastructure éphémère, comme les comptes d’administration AWS (Amazon Web Services) pour les identités humaines.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management
    
CarbonBlack
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: CDW-Trend Micro     Published Date: Aug 04, 2015
This is a whitepaper about how organizations are constantly under attack from increasingly advanced cyber adversaries.
Tags : 
ecosystem, cyber attack, antivirus, security, single vendor, endpoint, digital, web, holistic, email systems, hosted service
    
CDW-Trend Micro
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.