personal device

Results 101 - 125 of 153Sort Results By: Published Date | Title | Company Name
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
You know what you need to do—provide personalized service anytime, anywhere, on any device. You know why you need to do it—a 10 percent increase in your customer experience score can translate into an additional $1B in revenue! The issue is, “How to get from where you are today, to where you need to be?” That’s where Oracle’s Roadmap to Modern Customer Service (RTM) can help. The RTM framework enables you to determine your current stage of customer service maturity and map out your steps for getting to the next level. To help get you started, here is a brief overview of the three stages of customer service maturity.
Tags : 
oracle, service cloud, customer service, customer engagement
    
Oracle Service Cloud
Published By: Eaton     Published Date: Jul 12, 2019
The production of counterfeit products is an increasing problem that affects the entire electrical industry. Counterfeit protective devices, like circuit breakers, including GFCI and AFCI for personal protection, pose one of the most significant risks to facility and employee safety. Because counterfeit products are more difficult to detect than ever, we as an industry must do more to guard against their risks and liabilities. By purchasing products from authorized resellers and using available tools to authenticate products, buyers can ensure a safer supply chain that mitigates the risk sub-standard and counterfeit electrical safety devices pose.
Tags : 
    
Eaton
Published By: SAS     Published Date: Apr 25, 2017
Reacting to our customer’s “moments of truth” will require unique, personalized responses in real time that transcend traditional marketing and span channels and devices. This is more than marketing maturity: it’s the new marketing imperative.
Tags : 
    
SAS
Published By: Adobe     Published Date: Aug 02, 2017
It’s such a diverse space, and today’s discerning shoppers rightly want a consistently great retail experience. This means a fully personalised and user-friendly service, across multiple devices and touchpoints. Nowadays, a run-of-the-mill digital experience just doesn’t cut it.
Tags : 
customer experience, insights, shared service value, consolidated services, global services division, organization optimization, social analytics, accounts receivable
    
Adobe
Published By: Kaseya     Published Date: Nov 18, 2013
The BYOD trend is now mainstream and growing rapidly in acceptance. Gartner now estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.
Tags : 
kaseya, byod, technology trends byod, mobile, mobility, mdm, mobile device managment
    
Kaseya
Published By: Adobe     Published Date: Feb 22, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
time management, pfeiffer, stock images, adobe, adobe stock, creative cloud
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
creative assistance, graphic design, photo editing, creative cloud, design, creative design, photoshop, stock photography
    
Adobe
Published By: Adobe     Published Date: Sep 28, 2016
Download our new guide, Up Close and Personal, to learn how you can make the most of marketing’s hottest real estate — the mobile device. You’ll discover the tools and strategies you need to adopt a mobile-first mindset, so you can connect personally with customers. Right where they live. Get the guide now to explore the three Cs of mobile engagement: • Context — maximize mobile capabilities to make it relevant • Connection — discover strategies to make it personal • Cadence — learn to orchestrate content and time it right
Tags : 
adobe, marketing, marketers, mobile, engagement, emerging marketing, internet marketing, traditional marketing
    
Adobe
Published By: Adobe     Published Date: Sep 28, 2016
As the digital landscape evolves, marketing channels become more complex. That means that personalizing advertising campaigns across every channel is becoming even more crucial. Read Cross Channel Advertising with AMO to learn how managing advertising campaigns programmatically lets you deliver unique customer experiences while giving you the control and insight you need. Download our report to learn more about: • Search marketing standards across the US and UK in 2015 • The recent shift of consumer transactions on mobile devices • The next big trend in ad spend
Tags : 
adobe, cross channel, cross channel advertising, advertising, marketing, marketing channels, digital, emerging marketing, marketing research, traditional marketing
    
Adobe
Published By: VMware AirWatch     Published Date: May 18, 2016
A Google Trends search for “BYOD” reveals it is a fairly new term, appearing in news publications for the first time in late 2011. BYOD is one part of a much larger, deeper-rooted trend: The consumerization of IT, which can be traced back to the early 2000s. Around that time, most everyone had a personal computer, which enabled them to work from home after hours – and to realize the benefits of using the devices that they had carefully chosen and were comfortable using, rather than the corporate devices their IT departments had issued them. BYOD and the consumerization of IT continued to grow as devices became cheaper and more connected. Where IT leaders were once solely concerned with reining in all the unapproved devices accessing the corporate network, a recent Intel and readwrite report that shows 49 percent of U.S. IT managers “strongly agree that BYOD improves worker productivity.” The next era of BYOD has arrived, and IT departments are thinking about it as a strategic value-ad
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Cisco     Published Date: Jan 16, 2014
This document is a Cisco Validated Design (CVD) for Cisco Bring Your Own Device (BYOD) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for deploying personal, corporate, and guest devices onto a network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a BYOD solution, this CVD will continue to evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution.
Tags : 
cisco, byod, wireless, bring your own device, cisco validated design, cvd
    
Cisco
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: SAP     Published Date: Sep 10, 2010
The forces of consumerization are sweeping over the mobile world, with workers bringing their personal devices into the office and increasingly asking for IT support for those devices. How you respond to this challenge will say a lot about the mobile environment of your organization as a whole, and a lot as well about just how productive these mobile users can be. This strategic PlayBook and accompanying Webcast will offer you very practical ways to grab hold of this mobile trend of consumerization and help your mobile workers to be more effective and productive.
Tags : 
sap, consumer mobile devices, iphone, adoption, mobility, wireless, smartphones
    
SAP
Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management
    
SAP
Published By: Iovation     Published Date: Sep 25, 2009
Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.
Tags : 
cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy, iovation reputationmanager, device fingerprinting, low false positives, pattern matching, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, device id, device reputation authority
    
Iovation
Published By: Adobe     Published Date: Jan 12, 2015
To drive loyalty and revenue, brands need to deliver personalized, meaningful digital experiences. Many marketers are looking for an end-to-solution that delivers multi-channel experiences on any device and helps create personalized content for every customer. The ability to deliver digital experiences that differentiate your brand and deepen customer relationships is more crucial than ever to driving business success.
Tags : 
adobe, marketing, digital, multi, channel, personalization, experience, brands, strategies, solutions, conversation, revenue, intelligence, differentiation, content, cms, mobile, social, technology, loyalty
    
Adobe
Published By: Adobe     Published Date: Apr 03, 2015
To drive loyalty and revenue, brands need to deliver personalized, meaningful digital experiences. Many marketers are looking for an end-to-solution that delivers multi-channel experiences on any device and helps create personalized content for every customer. The ability to deliver digital experiences that differentiate your brand and deepen customer relationships is more crucial than ever to driving business success. Read the Econsultancy report, Delivering Digital Experiences, and learn why: • Marketers are looking for new digital experience strategies and solutions • Experience-driven commerce helps maximize conversions and revenue • The ability to deliver multi-channel digital experiences is mission-critical
Tags : 
digital experience, personalization, strategy, solution, multi-channel, adobe, website development, emerging marketing, social media, internet marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2017
Download our new guide, Up Close and Personal, to learn how you can make the most of marketing’s hottest real estate — the mobile device. You’ll discover the tools and strategies you need to adopt a mobile-first mindset, so you can connect personally with customers. Right where they live. Get the guide now to explore the three Cs of mobile engagement: • Context — maximize mobile capabilities to make it relevant • Connection — discover strategies to make it personal • Cadence — learn to orchestrate content and time it right
Tags : 
mobile device, marketing, mobile-first mindset, mobile capabilities, engagement
    
Adobe
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : 
ibm, bring your own device, byod, mobile
    
IBM MaaS360
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations
    
BlackBerry
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.