Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

business customers

Results 826 - 850 of 986Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: May 28, 2013
It only takes a few hours downtime to cripple your organization. Business partners and customers rely on IT services such as email and database applications, making operational continuity critical. Find out how you can be prepared: Building Higher IT Business Continuity in the Face of Disaster.
Tags : 
dell quest, dell appassure, it recover, it business continuity
    
Dell Software
Published By: RingCentral     Published Date: May 14, 2013
The phone allows your business to flourish. It's your lifeline to the outside world and is critical to the image you project to customers. It's your connection to your customers and millions of prospective customers who will reach out to you. That is why selecting the right phone system is important. Read this white paper to learn the 5 mistakes to avoid when selecting a business phone system.
Tags : 
ringcentral, business phone system, phone system, prospective customers, 5 mistakes to avoid
    
RingCentral
Published By: Sponsored by HP and Intel®     Published Date: May 09, 2013
This IDC paper “Business Value of Blade Infrastructures” indicates the considerable cost savings and the improved agility of the IT infrastructure by migrating to an HP BladeSystem environment. In fact, HP BladeSystem cut data costs by 68%. Customers participating in this study were able to pay back their initial investment in just over 7 months, a significant factor given the financial constraints most IT organizations are facing.
Tags : 
storage, blade, server, infrastructure, study, business value, roi, bandwidth management
    
Sponsored by HP and Intel®
Published By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
staffing, hireright, human resources, hr department, clients, potential employees, human resource technology
    
HireRight
Published By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
Symantec
Published By: Adobe     Published Date: Mar 07, 2013
This report: highlights the importance and challenges of Big Data, Outlines the changing role of key business decision makers in driving big data initiatives and explains how businesses can better understand their customers and unlock new revenue.
Tags : 
big data, customer engagement, personalisation, customer experience
    
Adobe
Published By: Oracle Corp.     Published Date: Feb 12, 2013
As the technologies and business practices surrounding Social, Mobile and BPM mature, IT and business stakeholders are discovering new ways to collaborate and engage customers via dynamic business processes that address several business imperatives.
Tags : 
customer experience, business process management, social, mobile, bpm, integration
    
Oracle Corp.
Published By: IBM     Published Date: Jan 09, 2013
IBM’s security controls provide privacy and controlled authorization to sensitive information while enabling business operations. SC4SB protects our customers' information through governance, tools, technology, techniques, and personnel.
Tags : 
smartcloud, ibm, social business security, ibm smartcloud, security, it management, data center
    
IBM
Published By: Jive Software     Published Date: Dec 05, 2012
In this webcast, HP and Jive Software will discuss how social business tools can enable valuable discussions between both customers and companies as well as among employees internally.
Tags : 
social business, social software, jive software, social collaboration, social business technology, collaboration
    
Jive Software
Published By: Oracle     Published Date: Dec 03, 2012
The Business Value of Customer Experience: Attracting New Customers
Tags : 
oracle, crm, customers, business value, customer lifecycle, youtube, free webinar
    
Oracle
Published By: SAP     Published Date: Nov 28, 2012
Across all businesses, they would like nothing better than to know what their customers like. How old are they? What do they like? Structured customer intelligence was the primary currency and see how social interaction enhances engagement.
Tags : 
social interactions, sap, customer engagement process, customer, experience, customer relationship, multi-channel environment
    
SAP
Published By: IBM     Published Date: Nov 14, 2012
No matter what your business sells, where it operates or who its customers are, its ongoing success might ultimately depend on the answers to three simple questions. Read on to learn how these questions may help business success.
Tags : 
transaction integrity, integral business success, ibm, it systems, data center
    
IBM
Published By: Sysomos     Published Date: Oct 24, 2012
Getting the right people excited about your brand is a powerful way to increase brand awareness and make sales. But how do attract influencers and get them talking about you? Here are 6 tips from Sysomos.
Tags : 
social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, trends, assessment
    
Sysomos
Published By: Sysomos     Published Date: Oct 24, 2012
Leading brands use social media to attract and nurture brand evangelists, to generate leads and make sales, and much more. Here are 8 tips that Sysomos recommends for building your brand with social media.
Tags : 
social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, trends, assessment
    
Sysomos
Published By: Symantec     Published Date: Oct 12, 2012
This paper discusses how online businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
security solutions, online secutiry, ssl, secure socket layer, extended validation ssl, ev ssl, security
    
Symantec
Published By: Business.com     Published Date: Oct 09, 2012
Social media has come very far in the last few years, and one of the best ways for a business to interact with customers is now over the internet.
Tags : 
web design, business, web site, e-commerce, designer
    
Business.com
Published By: Business.com     Published Date: Oct 09, 2012
Credit cards are an integral part of modern business. Even customers who don't use credit will want to use debit or gift cards based around similar technology.
Tags : 
credit card, processing, credit card terminal, business technology
    
Business.com
Published By: SunGard     Published Date: Oct 05, 2012
What will the causes of downtime be in the near Future and How can You Minimize their impact?
Tags : 
sungard, business resiliency, globalization, commerce, data, reputation, ultimately, customers
    
SunGard
Published By: SAP     Published Date: Sep 12, 2012
The impact of new mobile technology can be dramatic for small and midsize firms, and there is clear opportunity for improving worker efficiency while ensuring network security. Read the questions posed by SAP to Raymond Boggs, vice president of IDC's Small/Medium Business Research practice, on behalf of SAP's customers.
Tags : 
mobile resources, mobile solutions, sme, mobile devices
    
SAP
Published By: Oracle     Published Date: Sep 10, 2012
Today's business-to-business (B2B) organizations are looking with renewed urgency for ways to improve efficiency, reduce costs, and retain existing customers. At the same time, they must make the right investments.
Tags : 
oracle, b2b, sales, reinventing, customer satisfaction, e-commerce
    
Oracle
Published By: Polycom     Published Date: Sep 04, 2012
This report examines the basic components of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers.
Tags : 
video collaboration, video conferencing, point-to-point, multi-point, video call management, polycom realpresence platform, content management, device management
    
Polycom
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Success Factors     Published Date: Aug 02, 2012
Measurable business results-that's what drives companies to partner with SuccessFactors. But each customer has a unique story to tell about their path to success. In this complimentary booklet, 28 SuccessFactors customers-large to small, in a variety of industries, and from around the globe-share their processes and results. With quotes, facts, and figures, the booklet shows business execution in action, with SuccessFactors BizX Suite. Find out how real customers moved beyond automating HR processes to actually aligning, optimizing, and accelerating workforce productivity in a way that drives measurable business results. With approximately 3,500 customers and 15 million subscription seats globally, many of the best names in the world rely on SuccessFactors software to deliver workforce performance that is second to none. Will their path to success help guide yours? Download the booklet today and find out.
Tags : 
successfactors, sap, customer spotlights, reference booklet, loud in the cloud, successfactors bizx, case studies, customers testimonials
    
Success Factors
Published By: SendGrid     Published Date: Jul 31, 2012
This guide takes a deeper dive into the issues and challenges around managing a commercial email infrastructure. If your business relies on email to reach new customers and keep current customers engaged, this guide is the answer.
Tags : 
    
SendGrid
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus
    
Qualys
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.