RSS feed Get our RSS feed

News by Topic

sms

Results 1 - 25 of 125Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
     SAS
By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
     Cisco EMEA
By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
     Oracle
By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
     Cisco
By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : dns, rdns, security, zero trust security, malware, data, network security
     Akamai Technologies
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
     Red Hat
By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
     Adobe
By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
     Adobe
By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
     Adobe
By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
     CA Technologies
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : abi. healthcare, cybersecurity, medical
     Extreme Networks
By: NetApp     Published Date: Mar 05, 2018
New innovations in storage technology are changing the game for data centers, and NetApp is working to help our customers capitalize on them. The introduction of faster and faster media types and more efficient mechanisms to access those media across well-defined SAN and Ethernet infrastructures will unlock unprecedented speeds, lower latencies, and dramatic improvements in system and application efficiency.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : software-defined wan, security, network functions virtualization, nfv, wide area network, intel
     Intel
By: Turbonomic     Published Date: Jul 05, 2018
Turbonomic enables organizations to understand - and compare - the precise costs of migrating optimized workloads from on-premises data centers to the public cloud, including licensing models and discounting mechanisms such as RIs and Azure Hybrid Use Benefit (AHUB). This on demand webinar explains the Turbonomic process, including customer case studies.
Tags : 
     Turbonomic
By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
     Cisco
By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
     SecureAuth
By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
     Carbonite
By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : hacker detection, advanced evasion techniques, network security, it security, security management
     McAfee
By: Mitel     Published Date: Dec 19, 2016
With this digital customer experience shifting from a "nice to have" offering to an essential service, any business that interacts with its customers must have the right technology to deliver a consistent experience across all media, as well as a concrete strategy for this broadened scope of service. Check out our new white paper for an overview of the digital expectations and habits of today's digital consumer, as well as practical next steps for transforming customer experience from dated to digital.
Tags : customer experience, sms, email, web chat, social media, mobile
     Mitel
By: Mitel     Published Date: Dec 19, 2016
As a professional with influence over the customer experience your business provides to your customers, you likely have a sense of which organizations are getting it right, whether they're your direct competitors or sources of inspiration in another line of business. While you can try to mimic, replicate or establish your own benchmarks to measure against based on these success stories, there's nothing more valuable than hearing how it's done directly from the pros. Check out our free e-booklet to learn from six companies that transformed their digital customer experience and saw measurable results in customer satisfaction, operational costs, employee productivity, and more.
Tags : customer experience, sms, email, web chat, social media, mobile
     Mitel
By: Mitel     Published Date: Mar 30, 2017
You know the way we communicate with each other has evolved, but what about the way your business communicates with your customers? A third of the US population is made up of millennials that use multiple channels when reaching out or making a purchase, so how does this shift affect your bottom line? More importantly, how closely aligned is your customer experience strategy with how customers are buying? Looking for some clarity? Check out this infographic for a clear understanding of how customers are shopping, why they abandon your transactions, and what steps you can take to keep them happy.
Tags : customer experience, sms, email, web chat, social media, mobile
     Mitel
By: Mitel     Published Date: Apr 07, 2017
L'expérience client est un facteur clé de différenciation dans l'environnement ultraconcurrentiel actuel. Plus que jamais, cette expérience est façonnée et proposée via des interactions numériques. Bien que la majorité des communications se font toujours par téléphone, les consommateurs comptent maintenant davantage sur les méthodes numériques, telles que le courrier électronique, les SMS, le chat en ligne et les réseaux sociaux. Les consommateurs se sont habitués au confort de pouvoir contacter l'entreprise par le média qui leur convient, où qu'ils soient. Ils s'attendent également à pouvoir basculer sans difficulté d'un moyen de communication à l'autre lorsqu'ils sont en déplacement.
Tags : 
     Mitel
By: Nexmo     Published Date: Nov 26, 2018
Companies have always been focused on the customer experience, but with the ever-changing landscape of how information is consumed, they have to react faster and provide more impactful interactions. Today's consumers expect businesses to communicate with them on the channels they prefer. This means messaging customers on the channels that provide straightforward and/or media-rich features. Savvy companies know that SMS is the messaging leader, but that MMS and other OTT channels, such as WhatsApp, Facebook Messenger, and Viber, provide a more engaging experience. They think about their overall messaging goals and as a big-picture concept. Join Sheri Atienza, Product Marketing Manager at Nexmo, in this webinar examining how messaging solutions can be the power behind your 2019 messaging strategy. You’ll learn how to customize your messages to both the audience and the medium, and how easy this can be with Nexmo.
Tags : 
     Nexmo
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics