success

Results 3626 - 3650 of 3854Sort Results By: Published Date | Title | Company Name
Published By: Urban Airship     Published Date: Oct 08, 2013
Want to see our best customer success stories (and maybe gather a few ideas from other brands’ best practices)? Our newest pocket-sized offering highlights customers from various industries, their objectives, and spectacular results in engagement, revenue and loyalty.
Tags : 
mobile marketing strategy, mobile relationship management, mobile marketing, push messaging, mobile engagement
    
Urban Airship
Published By: Varicent Software Incorporated     Published Date: Dec 20, 2011
SPM solutions are becoming attractive, not only because early adopters are achieving success, but also because there is increasing pressure on compensation teams to deliver more. Organizations are demanding more than just accurate commission statements that are delivered on time. They need visibility, analysis and oversight into the entire variable compensation process; increasingly, they are relying on their sales operations, compensation and cross-functional teams to provide more sophisticated insights into what is working and what isn't.
Tags : 
sales performance management, incentive compensation, icm, spm, variable pay, pay for performance, key trends, error reduction, accurate payments, deliverability, sales operations
    
Varicent Software Incorporated
Published By: Veeam '18     Published Date: Mar 13, 2018
As a smaller organization tasked with big responsibilities – public health and exceptional customer service around the clock – Vallejo needed a backup solution that kept pace with the growing needs of their company and customers and was easy to manage. They understood that backups played a critical role to success, but their existing solution was slow, cumbersome and expensive in their new, virtualized environment. They needed a solution that would boost backup speeds within their existing HP architecture while simplifying and streamlining management and cutting costs.
Tags : 
digital, customer, solutions, optimization, business
    
Veeam '18
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
    
Veeam '18
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
When implementing an enterprise fleet management and telematics solution, enterprise fleets, large and small, see significant value, cost-savings, and operational excellence that result in maximized profits across your organization's bottom line. This guide will assist you in learning about the wide range of benefits from a dynamic enterprise fleet management and telematics software and the latest features empowering fleets to make data-driven decisions that improve safety, efficiency, and productivity to drive long-term quantifiable success.
Tags : 
    
Vehicle Tracking Solutions
Published By: Venafi     Published Date: Mar 26, 2015
The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.
Tags : 
data protection, cyberattacks, data privacy, ssl/tls, security, privacy
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Vendor Guru     Published Date: Jan 04, 2008
Your organization, like most others, is probably searching for ways to improve the capability of its telephone system or replace it altogether. And given the number and variety of telephony options, organizations that fail to research their choices risk investing in a system that fails to meet their needs. However, bad IP telephony isn’t inevitable. Read this white paper to read success stories and best practices to keep your company on the right track.
Tags : 
pbx, ippbx, ip pbx, voip, voip, voice over ip, phone, phone system, ip telephony, telephony, vendor selection, voip provider, voip providers, vendor guru, vendorguru, vendor guru telephony, vendorguru telephony, quinstreet
    
Vendor Guru
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Verint     Published Date: Jan 16, 2013
Download this whitepaper for an in-depth look into establishing clarity about the customer need, improving customer service and the emergence of the Chief Customer Officer, a 21st century role.
Tags : 
customer experience, customer experience management, customer engagement, verint, vovici, customer service
    
Verint
Published By: Verint     Published Date: Apr 24, 2013
Commonwealth Bank of Australia, with over 1,000 branches and 50,000 employees was using spreadsheets to staff its branch network. When they looked to desktop process analytics from Verint they achieved major improvements in productivity and customer experience. Watch this case study to learn more about how desktop process analytics can use big data to help your organization.
Tags : 
case study, big data, organization, desktop process analytics, process management, analytics, workforce management
    
Verint
Published By: Verio     Published Date: Jul 06, 2011
This whitepaper will examine today's SaaS opportunities and challenges, and will show how a hosting company, such as Verio, can help ISVs capitalize on the rapidly evolving market opportunities.
Tags : 
verio, saas, software as service, managed services, website hosting, web site hosting, website hosting services, website hosting plans, domain name registration, register domain name, domain register, hosted exchange, hosted exchange server, microsoft hosted exchange, hosted microsoft exchange
    
Verio
Published By: VeriSign     Published Date: May 06, 2010
Online retailers must make consumers feel more comfortable on their web sites, instilling confidence in order to support sharing personal and financial information and ultimately completing purchases. Using proven ingredients outlined in this whitepaper can increase customer confidence and enable you to generate more sales.
Tags : 
verisign, online retail, customer confidence, security, ecommerce, shoppers, online purchasing
    
VeriSign
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Veritas     Published Date: Apr 06, 2016
Download this whitepaper for five critical pitfalls to avoid when building a successful data protection strategy for your organization.
Tags : 
    
Veritas
Published By: Veritas     Published Date: Dec 08, 2016
This Infographic outlines the below: The Data Environment How Active is the Data? Poor Data Behaviour Exposes Organisations to Risk Organisations that Deploy Information Governance Strategies are more Successful at Achieving these Desired Outcomes
Tags : 
data environment, data, big data, data management
    
Veritas
Published By: Viavi Solutions     Published Date: Oct 11, 2013
Managing UC means delivering streaming video fluidly, transmitting voice with clarity, moving IM's briskly, and send emails promptly. Easier said than done. To succeed from setup to show time, take these three tips to achieve the high performance end-users expect.
Tags : 
us applications, shortcuts to success, uc success, network instruments, achieve high performance, end-users, user expectations, network environment, qos, application and network management, optimize performance, critical applications
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Villanova     Published Date: Aug 21, 2009
Earned value (EV) has grown in popularity over the last several years. With 76% of IT projects failing (Crawford, 2002), project management and control systems must be implemented to ensure IT project success.  Learn how EV links to the work breakdown structure (WBS) the schedule and the budget.
Tags : 
project management, employee performance, budget, project success, villanova
    
Villanova
Published By: Vindicia     Published Date: Oct 04, 2017
The number of services available via online subscription is exploding—and the big bang of subscription is only gaining momentum. Companies want to turn one-time purchases into regularly recurring subscriptions or memberships. The siren song of subscription success is calling to executives in virtually every industry. Business leaders want ongoing revenue streams from an army of subscribers. But, as companies that plunged into recurring business models are realizing, subscriptions are more than just transactions that recur. Subscription success can be illusive. Too often, subscription models don’t generate the expected high, ongoing revenue streams.
Tags : 
    
Vindicia
Start   Previous    139 140 141 142 143 144 145 146 147 148 149 150 151 152 153    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.