Skip to main content
 

word

Results 226 - 250 of 561Sort Results By: Published Date | Title | Company Name
Published By: Five9     Published Date: Jun 14, 2019
An empowered agent workforce that delivers amazing customer experiences makes the difference when customer loyalty is on the line. There is a strong link between customer experience, customer loyalty, and business profitability. That’s why organizations in every industry strive to deliver experiences that customers love. Where is your organization today and how can you lead the digital transformation of customer experience in a way that truly empowers contact center agents to deliver the kind of service that will grow revenue and increase word of mouth about your brand? In this paper, we’ll explore four ways to help you achieve this goal.
Tags : 
    
Five9
Published By: ttec     Published Date: Jul 24, 2019
Fraud prevention and content moderation take center stage. Trust & Safety is good business Change your password often. Keep your virus software up to date. Beware of so-called princes from Nigeria. These are the costs of doing business online. Since its inception, the internet has always had its share of bad guys. And as nearly all companies move to a more digitally enabled world, the thieves, con artists, and hackers are finding new ways to steal money, information, and disrupt the world in a bad way. Having a trustworthy and safe brand is now a differentiator, especially from companies that operate primarily online. But it’s becoming harder to keep up as technology advances and information moves quicker every day. This eBook details how companies can protect their brand and keep customers safe by enabling fraud prevention and content moderation strategies and tactics.
Tags : 
    
ttec
Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta
    
Okta
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue. Think of all the passwords you keep track of for your personal needs—your mobile banking app, your Gmail, your Facebook account, your Amazon Prime… the list goes on. Best practices tell us that we should use a unique and complex password for every service, but due to increased cloud adoption—enabling anytime access to applications from any device—users lean toward convenient but risky password practices.
Tags : 
    
F5 Networks Inc
Published By: Aprimo     Published Date: May 01, 2012
The real-time buzzword is back. Marketers, vendors, and service providers use this term in a variety of scenarios to describe technologies, analytics, customer service, and processes. In this report, Forrester outlines how firms should evaluate the need to build an agile and real-time environment using a combination of analytics, technology, and business processes.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Burton Group     Published Date: Apr 08, 2008
Industry debate about the relative merits of OpenDocument Format (ODF) and Ecma 376 Office Open XML (OOXML) highlights the significance of the productivity application market shift from binary and proprietary file formats to vendor- and product-independent Extensible Markup Language (XML) models. The competitive stakes are huge, and the related political posturing is sometimes perplexing.
Tags : 
odf, document, open document format, burton group, xml, ooxml, office open xml, microsoft office, word, microsoft word
    
Burton Group
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, passwords, memory cards, smart credentials, authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
smart credentials, hardware, software, passwords, features, outdated physical access
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Zuberance     Published Date: Feb 11, 2012
Forward-thinking restaurant marketers are boosting positive Word of Mouth and sales by finding and activating their enthusiastic customers (AKA "Brand Advocates.") Learn how Rubio's Fresh Mexican Grill is doing this now and how you can too.
Tags : 
restaurant marketing, word of mouth marketing, social marketing, social media roi, brand advocates, reviews, yelp, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, emerging marketing, social media, sales
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
Energizing your enthusiastic customers (AKA "Brand Advocates") can bring you the ultimate prize: a powerful marketing force whose recommendations drive sales. Read social marketing success stories in Hospitality, Software, Fitness, Consume
Tags : 
hospitality, travel, software, consumer electronics, restaurants, word of mouth marketing, social marketing, social media roi, brand advocates, reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, emerging marketing, social media, advertising agencies
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
Companies that systematically identify and energize their enthusiastic customers (AKA "Brand Advocates") to recommend their brand and products online are getting at least a 10X ROI in media and sales value. Download this Zuberance whitepaper to learn more.
Tags : 
marketing, word of mouth marketing, social marketing, social media roi, brand advocates, online reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, social media, advertising agencies, traditional marketing
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
Word of Mouth is the "world's most powerful sales tool," according to Nielsen. In today's social-media-connected world, the voice of your customers is more influential than ever. But is Word of Mouth Marketing effective in B2B environments?
Tags : 
marketing, word of mouth marketing, social marketing, social media roi, brand advocates, online reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, b2b marketing, b2b social media, zuberance, emerging marketing, social media, advertising agencies, traditional marketing, sales
    
Zuberance
Published By: Zuberance     Published Date: Feb 11, 2012
In the social media era, Word of Mouth can make or break a hotel. Download the whitepaper to learn how to find and activate your most enthusiastic guests (AKA "Brand Advocates") to recommend your hotel, boosting ratings and bookings.
Tags : 
hospitality, travel, software, consumer electronics, restaurants, word of mouth marketing, social marketing, social media roi, brand advocates, reviews, digital marketing, social media marketing, lead generation, customer acquisition, online ratings, earned media, zuberance, social media, advertising agencies, e-commerce
    
Zuberance
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.