RSS feed Get our RSS feed

News by Topic

abs

Results 301 - 325 of 492Sort Results By: Published Date | Title | Company Name
By: Zendesk GmbH     Published Date: Apr 20, 2018
Überzeugte Kunden geben mehr aus Kunden geben mehr Geld aus, nachdem sie mit Ihnen gechattet haben – und 83 % aller Online-Käufer brauchen Hilfe, um einen Kauf zu tätigen. Lassen Sie Ihre Kunden nicht im Regen stehen, sondern greifen Sie ihnen unter die Arme, damit sie den Kauf abschließen. Warenkorbabbruch reduzieren Die Wahrscheinlichkeit, dass ein Kunde einen Kauf tätigt, ist dreimal höher, wenn Sie ihn mit proaktivem Chat ansprechen. Senden Sie zielgerichtete Nachrichten, um Kunden im Kontext zu helfen. Höherer Web-Umsatz Nachdem Spartan Race Live-Chat zu seinem Online-Store hinzugefügt hatte, ließ sich ein Anstieg des Retail-Umsatzes um 27 % und ein Kundenzufriedenheitswert für Live-Chat von 97 % verzeichnen. Mehr Markentreue Genau wie bei Interaktionen in einem normalen Geschäft können Live-ChatAgenten eine persönliche Beziehung zu Kunden knüpfen und die OnlineMarkentreue erhöhen.
Tags : 
     Zendesk GmbH
By: Oracle     Published Date: May 05, 2017
Vertriebsmitarbeiter vertreiben. Kunden kaufen. Digitalisierung verändert.
Tags : 
     Oracle
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Die digitale Transformation ist für mittelständische Unternehmen (100 bis 999 Mitarbeiter) ein absolutes Muss, um im digitalen Umfeld erfolgreich zu sein. Durch eine digitale Transformation können sich Unternehmen mehr Wettbewerbsvorteile verschaffen, indem sie Geschäftsprozesse automatisieren, operative Abläufe effizienter gestalten, Kundenbeziehungen vertiefen und neue Umsatzströme durch Produkte und Services generieren, die auf modernsten Technologien basieren. Die digitale Transformation kann durchaus als Reise gesehen werden, die damit beginnt, dass Unternehmen eine IT-basierte Vision entwickeln. Diese führt dann zu einer datenorientierten Strategie, bei der Analysen im Mittelpunkt stehen. Das Ergebnis solcher Initiativen hängt von der Fähigkeit des Unternehmens ab, Menschen, Prozesse, Plattformen und den Aspekt Governance effizient zu nutzen, um die Geschäftsziele des Unternehmens zu erreichen.
Tags : 
     Hewlett Packard Enterprise
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will examine the information security needs of midmarket organizations, and how SaaS security services can help address those needs specific to a distributed workforce.
Tags : messagelabs symantec hosted services, saas, distributed workforce, information security, software-as-a-service, messaging
     Symantec.cloud
By: Motorola     Published Date: May 05, 2010
Digital radio seemed to be the best route for NASCAR to achieve the key requirements surfaced in this study, which included their need to coordinate large numbers of radios, ensure absolute audio clarity, maintain consistent, reliable communications and have a radio that was durable enough to withstand a rough environment.
Tags : motorola mototrbo, communication system, digital radio, two-way radio, voice clarity, audio
     Motorola
By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
     Blue Coat
By: Workforce Software     Published Date: Dec 16, 2015
Do you want to know how other organizations design, execute, and measure workforce management programs? Here’s your chance.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
By: Symantec.cloud     Published Date: Sep 01, 2010
This white paper gives best practices for creating security policies and includes a set of recommended policy components.
Tags : messagelabs us, data protection, security policies, social networking, information security, policy management
     Symantec.cloud
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : messagelabs symantec, security safeguard, email spam, malware
     MessageLabs Ltd.
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
     Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
     Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
     Cisco
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability "
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability "
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability
Tags : 
     Hewlett Packard Enterprise
By: Maxaudience     Published Date: Oct 12, 2015
The value of hiring a full service marketing company is absolutely undeniable. Studies have shown that you can expect to see a growth revenue as high as 30% when you enlist the help of one of these companies, but that’s not true for every marketing company out there. Instead, you have to land with the right one to get results like that. Unfortunately, that’s not always as easy as it seems. Not only do you have to consider the type of ?rm you’re choosing, but the quality of the ?rm itself. Read the following for tips that can help when you are looking to change your marketing company!
Tags : full service marketing, growth revenue, marketing company, advertising agencies, marketing research
     Maxaudience
By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : messagelabs, compliance, email policies, policy, enforce policy
     MessageLabs
By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
     Symantec.cloud
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
     Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : citrix, firewall, security, svm
     Citrix Systems, Inc.
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
     Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : citrix, waf, firewall, tco, security
     Citrix Systems, Inc.
By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : ibm, nss labs, product testing, network security, computer security, application security
     IBM
By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : endpoint attack, endpoint protection, security, nss
     McAfee
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics