service and support

Results 301 - 325 of 423Sort Results By: Published Date | Title | Company Name
By: Dell Software     Published Date: Nov 17, 2014
In the race to establish and maintain strong customer relationships, line-of-business executives are increasingly turning to cloud-based, software-as-a-service (SaaS) applications like Salesforce. That’s because these applications offer greater functionality and scalability than on-premises applications. An enterprise-grade, Integration platform as a Service (iPaaS) application can provide a unified approach and toolset to support today’s disparate, hybrid IT landscape, and offer benefits for companies of all sizes. Read this guidebook to learn how to build better customer relationships by connecting the data the data that runs your business, and automating business processes that can benefit from Salesforce application integration.
Tags : integration, customer relationships, cloud-based software, functionality, scalability, data, enterprise applications
     Dell Software
By: MobileForce Software     Published Date: Nov 19, 2014
GigaOm is seeing a new breed of services that promise to accelerate the mobilization of existing enterprise applications and business processes. Early mobile-application development solutions (MADP) were resource-intensive, requiring custom client code for each supported platform, as well as an on-premise middleware layer to connect mobile clients to enterprise backend systems. In this new model, code-free, configuration solutions - aimed at business analysts and lines of business- are revolutionizing the landscape, consolidating tools and services to simplify cross-platform enablement, and reducing time to deploy and cost tremendously. This report describes mobile-application configuration (MAC) tools, articulates their business value and suggests conditions under which they may be a good choice for an organization.
Tags : mobilization, enterprise applications, business processes, development solution, resource-intensive, client code, platform, middleware
     MobileForce Software
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : forrester, enterprise, data, technology, best practices, innovation, security
     SnowFlake
By: SAP     Published Date: Sep 10, 2009
Learn why insurers need a 360-degree view of each customer covering his or her entire experience with the company in order to provide products and service that stand out from the crowd. See how IT that supports integrated, end-to-end business processes can also increase insurer responsiveness and customer loyalty.
Tags : sap, customer value, insurance, integration, it strategy, erp, automation, bpm
     SAP
By: SAP     Published Date: Mar 25, 2011
Forrester evaluated the customer service and support capabilities of 19 leading CRM suite solutions against 196 criteria. SAP ranks as a leader due to having "the most complete customer service solutions.
Tags : customer service solutions, crm suites customer service solutions, crm suites
     SAP
By: IBM     Published Date: Apr 15, 2015
With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.
Tags : ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric
     IBM
By: IBM     Published Date: Apr 15, 2015
Optimize your business processes in the cloud with a next generation BPM strategy — an intelligent Business Platform (iBP) that implements an on demand, “service as you need it” model. Take advantage of Infrastructure as a Service (IaaS) for pure technology - processing, storage, networks with payment based on usage. Develop and manage business processes using the BPM Platform as a Service (BPMaaS), providing the BPMS tools supported by cloud services. Work with live business processes used by customers, suppliers, employees and trading partners, using Business Processes as a Service.
Tags : ibm, optimization, cloud computing, iaas, business platform, data storage, business intelligence
     IBM
By: IBM     Published Date: Jul 13, 2017
IBM has a unique position in the marketplace, with cognitive platforms and services, industry-specific offerings and expert consulting to support electronics companies. To understand how the electronics industry is applying cognitive computing to manufacturing, the IBM Institute for Business Value surveyed 140 electronics executives around the world and across all industry subsectors. We found that a core group of early adopters has kicked off a new generation of production success with cognitive manufacturing and show greater returns on investment (ROI) with increased productivity. Our analysis answers some important questions.
Tags : ibm, consulting, cognitive, electronic manufacturing, roi, increased productivity, cognitive manufacturing
     IBM
By: Taridium     Published Date: Aug 23, 2007
The Taridium managed VoIP offering (TMV) is a complete PBX replacement solution for small to medium enterprises. Taridium Managed VoIP combines the reliability of an on-premise open standards VoIP telephony system with the convenience of a simple monthly fee for equipment, services and support.
Tags : voip, sip, ip pbx, ip telephony, sip voip, voip pbx, microsoft pbx, microsoft integration
     Taridium
By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings
     WebEx Communications
By: WebEx Communications     Published Date: Dec 14, 2007
Enterprises around the world are discovering new ways to optimize business processes using on-demand web services. These businesses use WebEx online collaboration applications to reach, educate, and support a growing number of employees and customers. Companies can now collaborate anywhere, any time, without boundaries.
Tags : online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos
     WebEx Communications
By: WebEx Communications     Published Date: Dec 14, 2007
Based on a survey conducted by ServiceXRG, this paper explores the use and effectiveness of remote support technology across all industry sectors and how companies can take remote support to the next level to significantly improve the support transaction process, reduce service delivery costs and increase solution effectiveness.
Tags : remote support, remote access, help desk, helpdesk, customer support, support, customer experience, customer satisfaction
     WebEx Communications
By: GoToAssist     Published Date: Oct 05, 2011
The challenges of today's service and support environment just might be keeping you awake at night. The expectations are great and the daily demands relentless. But there's hope. By moving away from the current break/fix technical support model and providing a value-added customer experience, organizations can gain a significant business advantage. This TSIA white paper identifies the 6 toughest issues impacting service and support organizations today, and it offers guidance on improving service levels and how to differentiate competitively based on quality of service.
Tags : citrix, executives, business, customer experience, technical support, technology
     GoToAssist
By: HP     Published Date: Jul 22, 2014
IT has never been more important to doing business, which means that IT infrastructure must be simpler, smarter, faster, more flexible, and more business-aligned than ever. New service delivery models are driving new Tier-1 storage requirements that reveal how the traditional focus on performance and availability are clearly not enough to support virtualization, ITaaS, and new cloud service delivery models. The world is moving rapidly towards a New Style of IT, and will leave behind any business that doesn’t adapt even more rapidly. Is your storage ready?
Tags : tier-1, itaas, cloud, technology, infrastructure, storage, data management
     HP
By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
     Group M_IBM Q2'19
By: IBM     Published Date: May 07, 2013
Knowing the potential benefits of cloud computing, IBM implemented this technology for six workloads—development and test, analytics, storage, collaboration, desktop and production application. And the results have yielded significant financial and operational improvements. IBM shares some key insights through this report, learned after a successful move to cloud, including different ways in which each workload benefited. It also reveals how adopting cloud enabled significant improvements in efficiency, innovation, service and support levels. Download: Success in the cloud: Why workload matters.
Tags : success, cloud, improvements, efficiency, innovation, service, support
     IBM
By: IBM     Published Date: Jul 29, 2016
Read this white paper to learn how to: - Use B2C best practices to meet buyer expectations for enhanced online experiences - Deliver multiple combinations of products and services for faster, streamlined quoting and ordering - Support complex buying cycles and selling executions across channels and markets—and around the world
Tags : ibm, b2b, b2b commerce, commerce, b2c, online retailers, ecommerce, enterprise applications
     IBM
By: IBM     Published Date: Oct 11, 2016
Read this white paper to learn how to: - Use B2C best practices to meet buyer expectations for enhanced online experiences - Deliver multiple combinations of products and services for faster, streamlined quoting and ordering - Support complex buying cycles and selling executions across channels and markets—and around the world
Tags : ibm, b2b, business to business, commerce, b2b commerce, online shopping, online commerce, b2c
     IBM
By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : ibm, gartner, cloud, cloud security, casb, ciso, security
     IBM
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q4'19     Published Date: Oct 28, 2019
Privileged access management (PAM) is the top cybersecurity project for chief information security officers. Managing and protecting privileged accounts is critical. Check out the latest interactive whitepaper for a detailed analysis of PAM, endpoint privilege management, application control and integrations with identity governance. Get scalable, enterprise-grade security solutions, backed by unmatched service and support from IBM Security.
Tags : 
     Group M_IBM Q4'19
By: Hewlett-Packard     Published Date: Aug 02, 2013
"Cloud computing, also known as 'IT as a Service', is predicated on delivering IT services on demand, an idea that has support from business leaders as a way to better align IT with business operations. Cloud computing has two key requirements: virtualized applications and seamless support and integration between the server, networking, storage and hypervisor components. In this paper, we explore these concepts and highlight the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components-with a particular focus on the important role that storage plays in the evolution of the datacenter architecture."
Tags : datacenter, architectures, cloud, virtualization
     Hewlett-Packard
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com