RSS feed Get our RSS feed

News by Topic

act

Results 13551 - 13575 of 14372Sort Results By: Published Date | Title | Company Name
By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : live chat, live chat software, proactive live chat, online sales conversions, ecommerce, online customer experience, customer support productivity, online sales
     Velaro
By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
     Velaro
By: Vena Solutions     Published Date: Oct 29, 2018
As digitization drives business at ever-faster speeds, CFOs recognize the need to keep pace. They understand the importance of financial planning and analysis (FP&A) solutions that allow their finance teams to develop budgets and forecasts quickly and accurately. They need confidence in their numbers and the decisions they drive. But selecting the right FP&A software is only half the battle.
Tags : fp&a software, fp&a, financial planning and analysis, fp&a solutions, financial planning, financial analysis, fp&a process, fp&a implementation
     Vena Solutions
By: Vena Solutions     Published Date: Oct 29, 2018
Discover how Vena’s partnership with Sage Intacct brings together the leader in FP&A software satisfaction and ease-of-use with the innovation and customer satisfaction leader in cloud financial management solutions.
Tags : microsoft dynamics, erp, erp systems, erp integration, reduced budget cycle, annual budget cycle, excel templates, gl templates
     Vena Solutions
By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : venafi, ssh keys, vpn credentials, digital certificates
     Venafi
By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : secutiry, certificates, keys, security attacks, business
     Venafi
By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
     Venafi
By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
     Venafi
By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network
     Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : security, internet security, privacy, digital security certificates, security keys
     Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : security, internet security, privacy, digital security certificates, security keys
     Venafi
By: Vendor Guru     Published Date: Dec 21, 2007
Managing customer relationships profitably is a challenge many businesses face. Increasingly available information and customer choices translate into a decrease in automatic loyalty. New distribution and communication channels create more complex customer interactions. Implementing powerful technology enablers may be prohibitively expensive for many firms.
Tags : crm, customer relationship management, crm solution, crm software, loyalty, customer loyalty, customer satisfaction, customer interaction
     Vendor Guru
By: Vendor Guru     Published Date: Dec 21, 2007
Small and medium businesses (SMBs) continue to fuel demand for customer relationship management (CRM) systems, and more software firms are stepping up to offer appropriate technologies. SMBs, defined as companies with 1,000 or fewer employees, are searching for CRM solutions that will allow them to satisfy customers, control costs, and comply with various government regulations. But when choosing CRM software, it’s important to keep in mind that the needs of small and medium businesses aren’t always the same.
Tags : customer satisfaction, customer retention, crm, crm solution, customer relationship, customer service, vendorguru, vendor guru
     Vendor Guru
By: Vendor Guru     Published Date: Dec 21, 2007
This white paper examines the details of how to gain improved customer retention and acquisition for a lower overall investment by defining basic CRM functionality needed by most organizations to achieve their customer goals and objectives.
Tags : crm, crm tool, crm tools, crm solutions, customer retention, retention, customer relationship, customer satisfaction
     Vendor Guru
By: Vendor Guru     Published Date: Dec 21, 2007
In a 2006 survey conducted by CRMGuru, 50% of the respondents indicate that they base their satisfaction with a company on the sum of "interactions with a brand's products, services, and people." How does your company measure up? You have an excellent product, your customer service department is highly responsive, and your personnel have received extensive training.
Tags : customer satisfaction, customer retention, crm, crm solution, customer relationship, customer service, vendorguru, vendor guru
     Vendor Guru
By: Vendor Guru     Published Date: Jan 04, 2008
Today, companies can prosper from a wide range of computer telephony integration (CTI) solutions. CTI is the full integration of voice and data systems. The convergence of computer systems with call center operations adds increased scalability and muscle to existing business operations.
Tags : contact center, call center, call center management, call center improvements, call center productivity, productivity, vendor guru, vendor guru telephony
     Vendor Guru
By: Vendor Guru     Published Date: Jan 04, 2008
Your organization, like most others, is probably searching for ways to improve the capability of its telephone system or replace it altogether. And given the number and variety of telephony options, organizations that fail to research their choices risk investing in a system that fails to meet their needs. However, bad IP telephony isn’t inevitable. Read this white paper to read success stories and best practices to keep your company on the right track.
Tags : pbx, ippbx, ip pbx, voip, voip, voice over ip, phone, phone system
     Vendor Guru
By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
     Veracode
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security
     Veracode
By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : veracode, security, software security, application security, security benchmark
     Veracode
By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : veracode, security, devops, appsec
     Veracode
By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : veracode, security, devops, appsec
     Veracode
By: Veracode     Published Date: Jun 26, 2019
Software plays a central role in business processes and in our daily lives, and companies of all sizes and industries are building, buying and downloading more applications than ever before. However, this increased dependence on software makes the applications powering our world a prime target for cybercriminals. Applications are the No. 1 attack vector for cybercriminals and the main source of breaches. In addition, the way software is developed is changing. Contemporary application development methodologies like DevOps are increasing the speed and precision with which software is produced and deployed. The increased speed and precision have created a modern software factory akin to the manufacturing factories of past industrial revolutions.
Tags : 
     Veracode
By: Veracode     Published Date: Jun 26, 2019
SECURITY SKILLS ARE NO LONGER OPTIONAL FOR DEVELOPERS
Tags : 
     Veracode
By: Verint     Published Date: Jul 10, 2013
In this research perspective sponsored by Verint, Ventana research delves into customer experience management. You'll learn about the importance of the customer experience when dealing with a company and how it can strongly impact their propensity to remain loyal - to continue to purchase products and services from the company, to recommend it to other people and refrain from posting negative comments about it on social media
Tags : verint, customer experience management, customer experience challenges, customer analytics
     Verint
Start   Previous    536 537 538 539 540 541 542 543 544 545 546 547 548 549 550    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics