and group

Results 301 - 325 of 450Sort Results By: Published Date | Title | Company Name
By: Microsoft     Published Date: Jul 20, 2018
For sales organizations, customer engagement is about more than touchpoints—it’s about everything that happens in between personal and digital encounters. Customer engagement requires an organization-wide commitment to creating meaningful connections, building relationships, and nurturing those relationships to establish trust and keep your brand top-ofmind. “The realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle.” - Altimeter Group The realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle. - Altimeter Group Customer engagement drives every interaction, every process, and every decision—and it’s the key to driving sales. In fact, respondents from a May 2016 Microsoft survey of sales leaders across multiple industries ranked customer engagement the #1 dr
Tags : 
     Microsoft
By: Microsoft     Published Date: Jul 20, 2018
EXPECTATIONS FOR CUSTOMER SERVICE CONTINUE TO RISE AROUND THE GLOBE Customers expect more from brands when it comes to convenience, resolution times, and agent expertise. Evolving customer preferences are tightly linked to innovations in digital technology, and brands must embrace both in order to keep pace with heightened expectations. The good news is that brands that can deliver on expectations are rewarded with higher rates of customer retention and loyalty. The Microsoft 2017 State of Global Customer Service survey polled 5,000 people from Brazil, Germany, Japan, the United Kingdom and the United States. We continue to find commonalities along with distinct differences between locals. And though people in all age groups are embracing new digital trends, millennials especially are shaping the way brands need to think about the future of customer service engagement. Regardless of industry, service organizations are a customer engagement focal point for brands around the world. Our r
Tags : 
     Microsoft
By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
     Microsoft Office 365
By: Microsoft Office 365     Published Date: Mar 01, 2018
Much has been written about how to understand and work with millennials—but it's been from the perspective of forcing this group of tech-savvy and connected people into old ways of working. But consider this: by 2020, millennials will make up 50% of the workforce. Also consider: the way we work changes almost daily. That means it's time to rethink the entire conversation about working with millennials. In this eBook, learn 4 ways to motivate millennials in the workplace—and how the right technology plays a critical role.
Tags : 
     Microsoft Office 365
By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : mimecast, saas, email archiving, esg
     Mimecast
By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : email security, internal threats, mimecast, forrester
     Mimecast
By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
     Mimecast
By: Mintigo     Published Date: Sep 05, 2018
One of the most common use cases for AI in B2B is to make predictions about which accounts are most likely to buy and which leads are most likely to convert. However, use cases for AI are being extended beyond predictive account and lead scoring to include decision-making and process automation as well. Download this SiriusDecisions technology perspective on Predictive Analytics and Artificial Intelligence Technology to learn more. This paper will cover: • The benefits, evolution and capabilities of AI technology solutions for B2B organizations • The core and extended capability groups of AI • The business priorities supported by AI Fill out the form to get your free copy!
Tags : 
     Mintigo
By: MoreVisibility     Published Date: May 07, 2012
LinkedIn connections and groups foster a lot of interaction among professionals, who can discuss their respective industries and job functions. Learn more about the three main opportunities for you to become a master link builder on LinkedIn.
Tags : morevisibility, marketing, social media, emerging marketing, internet marketing, web analytics
     MoreVisibility
By: Motorola     Published Date: Feb 06, 2008
With over 13,000 employees and a large sales force spread around the world, the Gates Corporation is continuously evaluating the effectiveness of its technology services on employee productivity. In preparation for a strategic, company-wide technology initiative, the corporation's Worldwide IT Group found several issues related to mobile communications.
Tags : motorola, case study, motorola good
     Motorola
By: Motorola     Published Date: Feb 06, 2008
The need for the services provided by Specially for Children has continued to increase, placing extra demands on the group's physicians. To improve their efficiency, doctors began carrying multiple devices including cell phones, pagers and PDAs. Learn how Good Mobile Messaging helped the organization streamline its operation.
Tags : motorola, motorola good, case study
     Motorola
By: NAVEX Global     Published Date: Oct 15, 2014
In this whitepaper, Michael Volkov, CEO and owner of the Volkov Law Group shares best practices for building an effective anti-corruption compliance programme with a holistic approach.
Tags : anti-bribery programmes, holistic anti-corruption policies, global anti-corruption policy
     NAVEX Global
By: NetApp     Published Date: Dec 12, 2013
"How can you make sure that your private cloud is agile, responsive, and efficient? NetApp offers private cloud technology that aligns with the following recommendations from Enterprise Strategy Group: * Optimize storage to fully realize the benefits of server virtualization and private cloud * Treat storage efficiency as a strategic opportunity to hone and improve the overall cloud environment * Use techniques such as deduplication and compression to expand the available capacity of a private cloud"
Tags : private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, data management
     NetApp
By: NetApp     Published Date: Jun 09, 2014
How can you make sure that your private cloud is agile, responsive, and efficient? NetApp offers private cloud technology that aligns with the following recommendations from Enterprise Strategy Group
Tags : netapp, cloud computing, storage, private cloud array, best for company, private cloud, it management, data center
     NetApp
By: NetApp     Published Date: Jun 16, 2014
As the amount of data created by organizations grows, efficient management of these resources is becoming increasingly important. Simply retaining data is not enough; effective organizations must be able to leverage their IT and intellectual resources to deliver business value. This Evaluator Group report looks at the popular trend of the adoption of IT as a Service (ITaaS), also known as cloud services. As well as the several technologies needed to deliver ITaaS or Cloud.
Tags : netapp, evaluator group, enterprise storage, it as a service, itaas, cloud services, it management, data center
     NetApp
By: NetApp     Published Date: Jun 19, 2014
As the amount of data created by organizations grows, efficient management of these resources is becoming increasingly important. Simply retaining data is not enough; effective organizations must be able to leverage their IT and intellectual resources to deliver business value. This Evaluator Group report looks at the popular trend of the adoption of IT as a Service (ITaaS), also known as cloud services. As well as the several technologies needed to deliver ITaaS or Cloud.
Tags : netapp, evaluator group, enterprise storage, it as a service, itaas, cloud services, it management, data center
     NetApp
By: Network Automation     Published Date: Dec 08, 2008
Healthcare Management Solutions (HMS) is an industry leader in outsourced revenue cycle management for hundreds of healthcare industry clients. Its client base includes large for-profit and not-for-profit integrated healthcare delivery networks, stand-alone hospitals of all sizes, physician groups and managed care organizations of all types.
Tags : network automation, process automation, data management, networking, it management
     Network Automation
By: Nutanix, Inc.     Published Date: May 07, 2013
This report defines storage-centric virtualized infrastructure, its opportunity and use cases, and the emerging vendor landscape that IT infrastructure and operations groups should evaluate as they purse the software-defined data center.
Tags : converged infrastrucutres, storage, virtualization, server, storage-centric, lun, modular expansion
     Nutanix, Inc.
By: OC Tanner     Published Date: Apr 19, 2018
Recognition and appreciation are also vitally important in the workforce as organizations and their employees struggle to adapt to rapid change. New research conducted separately by O.C. Tanner and Brandon Hall Group shows the significant influence of recognition and appreciation in building a cultural foundation for change, innovation and a spirit of accomplishment.
Tags : 
     OC Tanner
By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
     Okta
By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas
     Okta
By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
     OneLogin
By: OpenText     Published Date: May 23, 2012
Download this report and learn how to: . Monitor, analyze and report on social media content . Manage brand effectiveness . Ensure brand consistency across social media and other marketing channels . Build an effective social compliance program
Tags : brand equity, governance, social media, social compliance, brand consistency, brand effectiveness
     OpenText
By: Oracle     Published Date: Feb 28, 2012
hat makes the connected customer tick and what can you do to ensure your brands are top-of-mind when these customers start and finish their browse and buy agendas? Find out in this paper by Lauren Freedman of the e-tailing group.
Tags : 
     Oracle
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com