Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

client access

Results 1 - 25 of 70Sort Results By: Published Date | Title | Company Name
Published By: SAP Concur     Published Date: Aug 07, 2019
"Companies need to provide a seamless experience for their road warriors who are traversing the globe in search of new clients, attending conferences, exploring new business opportunities and checking on projects. The goal of automating the T&E function isn’t just to save the company time and money, although that is a significant consideration. With policies in place, companies can ensure that business travelers are adhering to allowances for meals, hotels and other travel-related expenses. Companies that establish clear policies for how employees can book and pay for travel — and which vendors to use — can negotiate discounts and rewards with hotels, rental car agencies and airlines. In addition to the financial benefits of an expense management policy, employee satisfaction is also at stake. Creating a realistic travel policy that is clear, simple and easily accessible makes employees happy. A quick and hassle-free travel expense management process reduces traveler stress, enabling
Tags : 
    
SAP Concur
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: TIBCO Software     Published Date: Jan 17, 2019
2x faster time to market, single view of a client, improved data quality
Tags : 
data, client, virtualization, software, quality, distribution, bank, access
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jan 17, 2019
In an industry driven to deliver alpha, where might financial services firms find opportunities when investing in application innovation? The answer is data. Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. That’s how data delivers alpha.
Tags : 
virtualization, data, client, firms, application, liquidity, access, management
    
TIBCO Software
Published By: Pega     Published Date: Apr 04, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Clustrix     Published Date: Oct 08, 2013
This whitepaper outlines new database technologies that are helping advertisers remove bottlenecks that slow down applications, improve functions such as ad segmentation and targeting based on up to the minute campaign performance and give agency clients instant access to smart data.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics, smart data, applications
    
Clustrix
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Juniper Networks
Published By: JBoss Developer     Published Date: Oct 21, 2016
TMG Health, the largest business process outsourcing (BPO) provider in the Medicare and Medicaid market, relied on a slow, batch-oriented legacy application environment that prevented it from providing continuous data visibility and access to its clients. With help from Red Hat Consulting, TMG deployed a new application platform using Red Hat JBoss Enterprise Application Platform and other Red Hat solutions. As a result, TMG reduced development time and costs and delivered real-time data access and visibility to its clients.
Tags : 
consulting, efficiency, data, api, java
    
JBoss Developer
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Citrix ShareFile
Published By: Attunity     Published Date: Feb 12, 2019
This technical whitepaper by Radiant Advisors covers key findings from their work with a network of Fortune 1000 companies and clients from various industries. It assesses the major trends and tips to gain access to and optimize data streaming for more valuable insights. Read this report to learn from real-world successes in modern data integration, and better understand how to maximize the use of streaming data. You will also learn about the value of populating a cloud data lake with streaming operational data, leveraging database replication, automation and other key modern data integration techniques. Download this whitepaper today for about the latest approaches on modern data integration and streaming data technologies.
Tags : 
streaming data, cloud data lakes, cloud data lake, data lake, cloud, data lakes, streaming data, change data capture
    
Attunity
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"IDC's recently published report “IDC MarketScape: Worldwide Virtual Client Computing Software 2016 Vendor Assessment” (doc #256606, November 2016) named VMware as a leader. According to the IDC MarketScape report, “It would appear that the commitment made in 2013 (by VMware) is resulting in solid gains and the strategies that were employed have been effective. These elements, along with reference interviews, provide VMware with a solid rating in the IDC MarketScape. As a result, IDC has placed VMware in the Leaders category in this IDC MarketScape. VMware's position reflects the company's market position and commitment to providing resources to expand its VCC product portfolio as well as supporting software and hardware solutions.” Be the first to receive an excerpt of the IDC MarketScape: Worldwide Client Computing Software 2016 Vendor Assessment, available from VMware. Register now to access your copy.
Tags : 
    
VMware AirWatch
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: LogMeIn     Published Date: Mar 12, 2018
La prolifération de nouveaux appareils, la montée des préoccupations de sécurité en raison de l’augmentation de la cybercriminalité, ainsi que le nombre d’utilisateurs avertis qui veulent un service clientèle accessible en permanence sont des phénomènes qui contribuent tous à accroître la complexité du paysage des services informatiques. Heureusement, il existe une solution pour dénouer le problème. Selon une nouvelle étude menée par IDG Research et sponsorisée par LogMeIn auprès de professionnels de l’informatique en Europe, les outils d’assistance informatique à distance constituent la solution idéale pour soulager les services d’assistance informatique sous-dimensionnés en personnel.
Tags : 
complexite, croissante, l'informatique, l'assistance, indispensable, europe
    
LogMeIn
Published By: LogMeIn EMEA     Published Date: Mar 22, 2018
La prolifération de nouveaux appareils, la montée des préoccupations de sécurité en raison de l’augmentation de la cybercriminalité, ainsi que le nombre d’utilisateurs avertis qui veulent un service clientèle accessible en permanence sont des phénomènes qui contribuent tous à accroître la complexité du paysage des services informatiques. Heureusement, il existe une solution pour dénouer le problème. Selon une nouvelle étude menée par IDG Research et sponsorisée par LogMeIn auprès de professionnels de l’informatique en Europe, les outils d’assistance informatique à distance constituent la solution idéale pour soulager les services d’assistance informatique sous-dimensionnés en personnel.
Tags : 
    
LogMeIn EMEA
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have implemented the technology and processes to become more efficient at delivering client value. But choosing the right construction technology and making a compelling case for investment can be difficult. Download the eBook to demonstrate how construction software can be a significant driver of ROI across your business. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.