keys

Results 151 - 175 of 219Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Mar 13, 2015
We are now in a world of Unified Communications (UC) and your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on a phone or mobile devices (BYOD). As IM becomes the new dial tone (“U there?”, “Is now a good time to talk”), when your users want to talk, they expect to be able to place their phone call from their UC client. For most companies today, that UC client is Microsoft® Lync®. While the user may want to place their phone call from Lync, they also want to be able to use a telephone dial pad to dial numbers, access features with convenient feature keys, and be able to choose between using a handset, headset, or speakerphone—and they want to use their phones in ways that are fully integrated with their Lync client.
Tags : 
mobile, lync, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality
    
Polycom
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security, emerging marketing, crm solutions/software, marketing research, trust and security
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Symantec CloudSOC Cloud Data Protection allows enterprises to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle. Stay agile, competitive and compliant with the freedom to move sensitive or regulated information to the cloud while retaining physical ownership of encryption keys /token vaults.
Tags : 
cloud data protection, data protection, security, encryption, security infrastructure
    
Symantec
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
In this white paper, we measure how end users of Enterprise Resource Planning (ERP) applications describe the impact of Microsoft and SAP applications on their business productivity. This research found that Microsoft Dynamics end users on average rated their experience with Microsoft applications more favorably than SAP users rated their experience with SAP.
Tags : 
sap, microsoft, erp, enterprise resource planning, keystone, microsoft dynamics, productivity, business activity, efficiency, enterprise software, bpm, collaboration, survey
    
Microsoft Dynamics
Published By: Vocus, Inc     Published Date: Dec 16, 2008
Evaluate your current PR program to help you develop a plan that will reach your goals and objectives, while delivering value to the business.  Learn the four keys you need to plan for strong, focused and successful PR in 2009.
Tags : 
vocus, pr program, public relations, successful pr, pr 2009, other
    
Vocus, Inc
Published By: WebiMax     Published Date: Nov 25, 2009
It may be easily understood SEO can immensely help marketing efforts, yet with so many providers available, the process of deciding upon a service can be confusing. First, it is important to understand what search engine optimization is and what it can do for your company. Basically, SEO providers employ a number of tactics to gain positive momentum for your Web site on the search engines. Using specific, germane words and phrases related to a site's goods and services, an SEO service helps to make the site widely recognized by consumers and attract more revenue.
Tags : 
webimax, seo, search engine optimization, optimized, service provider, search engine optimization (seo)
    
WebiMax
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
    
Symantec
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation
    
IBM
Published By: IBM     Published Date: Oct 15, 2013
Discover the four key dimensions to personalized web marketing, and learn from the real life successes of enterprises that have made the personalized web a core part of their growth strategies.As you can see, web marketing can achieve comparable success when you make the four personalization steps your own.
Tags : 
ibm unica, click-throughs, personalizing web experience, customer needs, data sources, specific site analyses, across channels, sales and marketing opportunities, online and offline, customer interests, website traffic, referring sites, referring keywords, ibm smarter commerce
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value
    
IBM
Published By: TreeHouse Interactive     Published Date: Jul 27, 2010
This quick guide-written by marketing automation expert Ardath Albee details practical strategies and tactics to use in retaining customers.
Tags : 
treehouse, marketing automation, b2b, b2c, branding, objectives, nurturing, channel relationships, business intelligence
    
TreeHouse Interactive
Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, accounting, payroll, servers, network
    
Comcast Business
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shopkeepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, marketing opportunity
    
IBM
Published By: Introhive     Published Date: Sep 24, 2013
Connections exist throughout your entire organization. These connections can be leveraged with warm introductions to eliminate the need for cold calling into those key prospects and accounts. Download this white paper to discover how your relationship capital can increase ROI.
Tags : 
relationship capital, increasing roi, closing deals, sales, customer experience/engagement
    
Introhive
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shop-keepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources
    
IBM
Published By: Polycom     Published Date: Jan 06, 2015
This document will outline five easy steps to create awareness, increase utilization and expedite adoption of video collaboration across your organization. You’ve recently added video to your communications environment. Now the real challenge begins –getting your company to actually use the solution. What is the best way to launch and promote video collaboration internally? Which departments or groups should you be targeting? What are the keys to maximizing usage levels? What are the major concerns surrounding video, and how do you overcome them?
Tags : 
train, video, network, telecommuting, mobility, on-demand webinar, polycom, collaboration, guide
    
Polycom
Published By: Bronto     Published Date: Jul 16, 2012
Transactional messages are the most opened among message types. Find out the keys that will let you take advantage of this and drive more revenue from your transactional messages.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer, customer experience/engagement, business intelligence, market research, email marketing services/software
    
Bronto
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.