sms

Results 1 - 25 of 139Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
You've seen them, and you fear them. Now let us show you how to be cleaned of them. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Sophos makes it easy to secure and manage your mobile devices.
Tags : 
    
Pine Cove Consulting
Published By: SAP EMEA Global     Published Date: Sep 13, 2019
Managing employee experiences is not about pinpointing a single event or moment. People leaders need the ability to collect feedback at every moment that matters and take action to close experience gaps. With Employee Experience Management solutions from SAP, you can use a wide range of employee listening mechanisms across a variety of engagement channels to create a “digital open door.”
Tags : 
    
SAP EMEA Global
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: Experian     Published Date: Aug 29, 2019
Card-not-present fraud is estimated to reach $19.3 billion by 2022. Online payment fraud will grow 13.7% from 2017-2022 – Juniper Dive deeper into these data points with a focus on assessing the impact, challenges and opportunities presented by emerging payment mechanisms and regulation, as well as an in-depth assessment of sector-specific trends and outlook in regard to digital fraud. It provides essential reading for those wishing to understand where the key strategic focus should lie and how market forces are affecting the industry.
Tags : 
    
Experian
Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: S&P Global Platts     Published Date: May 24, 2019
Only months before the effective date of IMO 2020, there are a surprising number of shipping industry participants who believe that getting customers to pay for increased bunker costs will be smooth sailing. However, the reality may prove to be more complicated. This report explores how a lack of negotiating power and imperfect bunker cost recovery mechanisms could turn this shadow on the horizon into a dangerous storm for the shipping industry.
Tags : 
    
S&P Global Platts
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
At IBM Watson Marketing, we believe deeply in this practice and have dedicated a large effort to provide some of this critical data to marketers. The newest IBM Watson Marketing annual report of marketing benchmarks is bigger and better than ever with mobile marketing metrics data in addition to email marketing metrics. This year’s report includes traditional benchmark metrics such as email marketing open, click-through and unsubscribe rates, as well as email client and device data and engagement/read rates. New this year to the report are delivery and message frequency metrics for SMS and open and clickthrough rates for mobile push messages.
Tags : 
    
Group M_IBM Q119
Published By: Genesys     Published Date: Feb 12, 2019
Vos clients sont passés à l’heure du tout connecté. Ne manquez pas le coche. Conquérir de nouveaux clients tout en préservant la qualité de vos relations existantes demande un temps et une énergie considérables. Quand un client souhaite vous contacter, êtes-vous capable daller à sa rencontre sur le canal de son choix ? Dans un monde qui se digitalise, les entreprises doivent pouvoir communiquer avec le client où et quand bon lui semble : du téléphone aux réseaux sociaux, en passant par les SMS et le chat en ligne. Dans cet eBook, vous découvrirez : Comment aller à la rencontre du client dans un monde ultra-connecté Comment faciliter et augmenter lefficacité de vos opérations dengagement client Pourquoi migrer vers une solution de centre de contacts tout-en-un dans le cloud
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Avant d’appeler votre centre de contacts, la plupart des clients actuels auront déjà ou seront en train de visiter votre site web. Et pour eux, l’agent d’assistance devra le savoir au moment de prendre l’appel et ainsi leur offrir une expérience personnalisée. En d’autres termes, l’agent devra disposer d’un historique complet de leurs interactions. Or, de nombreuses entreprises peinent à relier tous ces points de contact. De fait, elles se retrouvent incapables d’offrir une expérience homogène sur tous les canaux, possible uniquement lorsque les agents disposent d’une visibilité complète sur les parcours des clients. Posez-vous deux questions. Votre infrastructure est-elle assez flexible pour prendre en charge de nouveaux canaux d’engagement client ? Intégrez-vous facilement de nouveaux canaux (vidéo, réseaux sociaux, SMS) à cette infrastructure ? Cet eBook explique comment résoudre ces problématiques et poser les bases d’une infrastructure capable de relever les défis de demain
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
I tuoi clienti sono ultra connessi. Fai in modo di esserlo anche tu. Trovare nuovi clienti e mantenere relazioni con quelli esistenti è un’attività impegnativa che porta via tempo. Quando i tuoi clienti sono pronti a interagire, li incontri proprio lì dove si trovano? In un mondo dai contorni sempre più digitali è fondamentale per tutte le aziende essere in grado di comunicare quando e dovunque il cliente desideri, che si tratti di una chiamata telefonica, SMS, chat online o social media. Scarica subito questo eBook per scoprire: Come coinvolgere e interagire con i tuoi clienti in un mondo ultra-connesso Come rendere semplici ed efficienti le tue attività di engagement del cliente Perché è arrivato il momento di adottare una soluzione di cloud contact center all-in-one
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 08, 2019
Ihre Kunden sind auf vielen Kanälen aktiv. Sorgen Sie dafür, dass Ihr Unternehmen mithalten kann. Die Gewinnung von Neukunden und die Pflege der Beziehung zu Bestandskunden sind mit Zeit und Aufwand verbunden. Wenn Ihre Kunden mit Ihnen in Kontakt treten wollen, können sie dies dann auf dem Kanal ihrer Wahl tun? Angesichts der ständig voranschreitenden Digitalisierung wird es für Unternehmen immer wichtiger, mit ihren Kunden jederzeit über die Kanäle kommunizieren zu können, die die Kunden wünschen – sei es per Telefon, SMS, Chat oder über soziale Medien. In diesem E-Book erfahren Sie mehr zu den folgenden Themen: Kundeninteraktionen in einer hochvernetzten Welt Einfache und effiziente Betriebsabläufe für Kundeninteraktionen Gute Argumente für eine cloudbasierte All-in-One Lösung für Contact Center
Tags : 
    
Genesys
Published By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
    
Zendesk
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Nexmo     Published Date: Nov 27, 2018
Companies have always been focused on the customer experience, but with the ever-changing landscape of how information is consumed, they have to react faster and provide more impactful interactions. Today's consumers expect businesses to communicate with them on the channels they prefer. This means messaging customers on the channels that provide straightforward and/or media-rich features. Savvy companies know that SMS is the messaging leader, but that MMS and other OTT channels, such as WhatsApp, Facebook Messenger, and Viber, provide a more engaging experience. They think about their overall messaging goals and as a big-picture concept. Join Sheri Atienza, Product Marketing Manager at Nexmo, in this webinar examining how messaging solutions can be the power behind your 2019 messaging strategy. You’ll learn how to customize your messages to both the audience and the medium, and how easy this can be with Nexmo.
Tags : 
    
Nexmo
Published By: Nexmo     Published Date: Nov 26, 2018
Companies have always been focused on the customer experience, but with the ever-changing landscape of how information is consumed, they have to react faster and provide more impactful interactions. Today's consumers expect businesses to communicate with them on the channels they prefer. This means messaging customers on the channels that provide straightforward and/or media-rich features. Savvy companies know that SMS is the messaging leader, but that MMS and other OTT channels, such as WhatsApp, Facebook Messenger, and Viber, provide a more engaging experience. They think about their overall messaging goals and as a big-picture concept. Join Sheri Atienza, Product Marketing Manager at Nexmo, in this webinar examining how messaging solutions can be the power behind your 2019 messaging strategy. You’ll learn how to customize your messages to both the audience and the medium, and how easy this can be with Nexmo.
Tags : 
    
Nexmo
Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe
Published By: Kronos     Published Date: Sep 24, 2018
When a government organization deploys lean workforce management practices, it affects their largest operational expense: the workforce. As the public sector moves to reinvent itself, workforce management systems and adopting lean labor practices are perhaps two of the most immediate and high-impact mechanisms. Lean practices help government organizations control labor costs and allow them to reallocate those savings into preserving critical programs, services, and jobs ... which is the very essence of the public sector mission.
Tags : 
    
Kronos
Published By: Iterable     Published Date: Sep 07, 2018
Email marketing continues to be the best digital channel for ROI, so delivering dynamic, personalized messaging to the inboxes of your customers is of the utmost importance. In fact, for 77 percent of consumers, email is the preferred messaging channel, dwarfing demand for SMS, push notifications and social media communications. When you are determining the right email marketing strategy for your business, it’s natural to wonder how the industry leaders are conducting their campaigns. A¬er all, if they’re on top, then they must be doing everything right...right? To glean best practices, we analyzed the email marketing strategies adopted by the top 100 e-retailers in the United States to study how they engage with their customers. These companies represent industries ranging from apparel and electronics, to auto parts and pet supplies, but all have the single goal of getting their users to go from inbox to checkout. We note what companies are doing across the board, as well as what spec
Tags : 
    
Iterable
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: Qualtrics     Published Date: Aug 20, 2018
In today’s era of immediacy, consumers are more demanding than ever. To keep up with customer expectations, brands are starting to invest in Voice of the Customer (VoC) programs that employ a closed-loop process. Ask any CX, research, or marketing executive, and they will tell you that gone are the days when the customer marketing landscape was represented by a one-way dialogue for engaging prospects. Today, market leaders are shifting their listening and response mechanisms faster as VoC programs represent a huge opportunity for driving loyalty and increased sales. A recent study sponsored by American Express®—the American Express Global Customer Service Barometer—showed that U.S. consumers are twice as likely to tell others about a bad service than they are to share about a positive experience.¹
Tags : 
    
Qualtrics
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Turbonomic     Published Date: Jul 05, 2018
Turbonomic enables organizations to understand - and compare - the precise costs of migrating optimized workloads from on-premises data centers to the public cloud, including licensing models and discounting mechanisms such as RIs and Azure Hybrid Use Benefit (AHUB). This on demand webinar explains the Turbonomic process, including customer case studies.
Tags : 
    
Turbonomic
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Payscale, Inc     Published Date: Apr 04, 2018
The business world now revolves around data. All employee actions and organizational decisions are backed by data (or at least that’s the idea). And as we set up ever-more mechanisms to capture information, and new data collectors emerge, there’s no shortage of available data sources.
Tags : 
    
Payscale, Inc
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.