customer potential

Results 101 - 125 of 129Sort Results By: Published Date | Title | Company Name
By: Neolane, Inc.     Published Date: Jul 13, 2010
Mornay Services, a subsidiary of the Groupe Mornay retirement fund, offers individual accident and health insurance as well as savings and credit products. Operating a direct sales model, Mornay Services boasts a portfolio of 200,000 repeat customers and a database of one million potential customers.
Tags : neolane, mornay, avatars, cross channel, marketing, groupe mornay, credit, savings
     Neolane, Inc.
By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking
     IBM
By: IBM     Published Date: Feb 14, 2014
A social business is an organization whose culture and systems encourage networks of people to create business value. Social businesses connect individuals, so they can rapidly share information, knowledge and ideas by having conversations and publishing informal content. They analyze social content from multiple channels and sources, in addition to structured data, to gain insights from both external and internal stakeholders. When those things happen, innovation and business execution rates increase, better decisions are made, and customers and employees are more engaged and satisfied. Social businesses enjoy lower operating costs, faster speed-to-market, improved customer and employee engagement, and increased profitability. Many organizations don’t fully appreciate the magnitude of the value creation potential of social business.
Tags : ibm, social business, marketing, social media, marketing management, analytics, marketing research, trends
     IBM
By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
     VMware
By: SugarCRM     Published Date: Jan 27, 2014
Customer relationship management software has been used by organizations of all types and sizes for over 20 years. However, few have managed to tap into the true potential of CRM. Learn how the power of CRM for the individual can transform your entire business.
Tags : crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
     SugarCRM
By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
By: Oracle     Published Date: Mar 04, 2014
This report looks at customers’ and businesses’ attitudes toward usage of multichannel interactions, and identifies the issues and potential pitfalls that businesses will face when trying to improve the customer communications across channels.
Tags : oracle, multichannel, oracle service cloud, cross chanel, mobile service, telephony
     Oracle
By: Progress Software     Published Date: Mar 12, 2014
Progress Software and Saugatuck Technology have come together to provide this Saugatuck Strategic Report which provides guidance to ISVs in transition not just to the Cloud – but to entirely new ways of doing business, new requirements from customers and partners, and new opportunities that enable significant reward, and related potential risk. This report shares not only Saugatuck’s analysis of key market shifts, and the key challenges faced by ISVs in these transitions, but also provides ISVs with critical success factors and best practices from more than seven years of Saugatuck Technology research and business consulting with a diverse range of software providers around the world.
Tags : progress software, saugatuck technology, isv, best practices, business challenges, cloud transition, technology challenges, data management
     Progress Software
By: Trapit     Published Date: Apr 06, 2015
In the past, simply having a presence on social media was enough for many companies. But social networking sites are changing, and so are buyers. Potential customers want to hear messages tailored specifically for them, and they want to hear those messages from someone they can trust. To maximize the potential of social media, today's marketers have to change their strategies. That's where employee advocacy comes in.
Tags : trapit, employee advocacy, employee marketer, social networking, brand advocation
     Trapit
By: Marketo     Published Date: Oct 17, 2016
Don’t waste another moment assuming, instead of knowing, your marketing campaigns are working. You could be alienating large customer groups or ignoring the potential to increase ROI for campaigns that do work, but could use improvement. Download now to learn more!
Tags : a/b testing, marketing strategy, campaign testing, roi
     Marketo
By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
     Symantec
By: Influitive     Published Date: Nov 04, 2015
Most B2B companies say the customer experience is a priority, but their teams are not prepared or coordinated enough to make this a reality.
Tags : b2b, influitive, customer experience, advocacy marketing, marketing
     Influitive
By: Schneider Electric     Published Date: May 03, 2018
The industry of tomorrow will be different. More volatile markets, new technology capabilities, and increased pressure on performance will precipitate the change. But with change comes opportunity…the Industrial Internet of Things (IIoT) has unleashed huge potential for industrial customers. There is a reported $14 trillion of new business growth up for grabs – and your goal of better business performance can help you earn your fair share of that growth. How can you make the most of this potential? Read the rest of this eBook to learn more.
Tags : vsd, vfd, variable speed drives, variable frequency drives, iiot, water, wastewater, oil & gas
     Schneider Electric
By: IBM     Published Date: Aug 21, 2008
Today, an IT-driven, customer-centric business approach isn’t a luxury — it’s imperative. More and more businesses are moving out of a cost-centric view of their IT potential and into a realization that IT can transform business processes. This white paper shows how you can maximize your IT function by leveraging ITIL best practice processes. These guidelines can help you effectively manage IT changes, assets, personnel and service levels all while reducing costs—going beyond simple IT asset management to deliver proactive IT business improvements.
Tags : itil, best practices, service management, asset management, ibm, ibm mi, ibm grm
     IBM
By: Quocirca     Published Date: Oct 05, 2007
Knowledge of the location of customers, property, products or any other asset is invaluable intelligence for improving competitive advantage and operational efficiency.  However, despite the proliferation of data that businesses generate today, the potential value of this location dimension is often overlooked in the business intelligence process.
Tags : business intelligence, business analytics, historical data, data analysis, gis, geospacial, geographic information system, geocoding
     Quocirca
By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Interactive Intelligence     Published Date: Feb 26, 2013
Utility outages are inevitable. How utilities communicate with the customers who are personally impacted by the outage has the potential to be a relatively positive or an incredibly negative experience. Learn about customer communications via social.
Tags : utlity outages, communications, social, best practices, negative experiences, interactive intelligence, enterprise applications
     Interactive Intelligence
By: Upstream Works     Published Date: May 15, 2008
It’s not surprising that first contact resolution (FCR) is becoming a high priority among forward-looking contact center managers. Increasing the percentage of contacts resolved during the initial contact provides three great benefits; customer satisfaction goes up, operating costs go down, and contact-center generated revenue goes up. There are also potential downsides, like extended handle time as agents strive to keep the caller on-line until the issue can be resolved.
Tags : customer, customer satisfaction, customer service, call center, call center management, contact center management, upstreamworks, upstream works
     Upstream Works
By: KEMP Technologies     Published Date: Aug 04, 2008
The Web experience is changing for consumers. While the National Retail Federation reports that over 90 percent of customers research products on the Web before purchasing, a single product photo and description is not enough to close the sale. Through broadband, with Flash and JPEG product images, retailers are providing information to potential customers which will improve the likelihood of closing the sale.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : sage, social media, human resources, recruit, risk, intellectual property
     Sage
By: Cisco     Published Date: Aug 18, 2014
Do communications really lead to a competitive advantage? Can a best-in-class unified communications platform lead to increased workforce and customer engagement? Get details in the “Unlocking the Full Potential of Collaboration with Cisco Unified Communications Manager Release 9” white paper.
Tags : research, customer engagement, communications, migrate, collaboration, new world, work, cloud
     Cisco
By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : innovation, best practices, mobile device, security, mobile workforce
     VMware AirWatch
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
     CrowdStrike
By: Datastax     Published Date: Aug 27, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
     Datastax
By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for manufacturing operations that assists customers with the entire process: from financial management to supply chain management and production management. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectivelyexamine the potential return on investment (ROI) enterprises may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their manufacturing organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with four Enterprise Management manufacturing customers, each with at least three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
     Sage People
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com