"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

identify

Results 1 - 25 of 765Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation
Published By: Genesys     Published Date: Feb 21, 2018
In the ongoing evolution of the customer experience, organizations continue to rely on phone and email while introducing new customer engagement channels. With the channel mix rapidly changing, it has become more important than ever to accurately identify and proactively deploy the next-best channels for engaging customers today and tomorrow. Gartner Research has profiled 15 ways that organizations will engage customers over the next 20 years. This includes augmented reality, virtual reality and mixed reality immersive solutions which will be adopted by 20% of large enterprises by 2020. By learning which engagement channels will best meet your customers’ needs in the future and prioritizing those aligned with your business model, you can improve customer engagement and
Tags : 
gartner, customer engagement, customer experience, gartner research
    
Genesys
Published By: Genesys     Published Date: Feb 22, 2018
Your customers expect effortless and personalized engagement across all their channels. Delivering exceptional customer service requires the platform, infrastructure, applications and resources to identify, route and switch interactions seamlessly between agents and channels, while keeping relevant data available throughout the customer journey. Download this paper to learn how to: • Transform single interactions into personalized customer journeys • Empower employees with the right set of tools, including a unified desktop • Quickly deploy new technologies, like blended artificial intelligence (AI), bots and virtual assistants to exceed your customers’ rapidly evolving expectations
Tags : 
contactbabel, contact center, omnichannel, routing, customer experience
    
Genesys
Published By: Genesys     Published Date: Feb 22, 2018
Is Your IT Team Ready to Enable Digital Transformation? Customers want fast access to information and immediate problem resolution on any device, from any location, at any time. It’s up to IT to build the foundation for this digital transformation—and increasingly, it’s cloud-based. Make sure your IT team is on track to deliver. An omnichannel contact center platform gives you a single, integrated view of the entire customer journey. And as a cloud-based solution, IT has the flexibility to deploy advanced features fast and cost-efficiently. Read this white paper from Frost & Sullivan for a pragmatic approach to: • Identify process changes and goals with lines of business • Benchmark your current infrastructure and technology gaps • Consider cloud omnichannel solutions for easier deployments and simple scalability
Tags : 
frost & sullivan, customer engagement, contact center, omnichannel
    
Genesys
Published By: IBM     Published Date: May 02, 2018
Learn what factors to consider in making your business case for digital identity fraud detection.
Tags : 
identity fraud, security, fraud detection
    
IBM
Published By: Epicor     Published Date: May 01, 2018
We all know the wisdom of monitoring familiar key performance indicators (KPIs). Turns, gross margin return on investment (GMROI), sales, inventory measures, and other metrics will tell you how your business is faring—and that’s pretty important if you want to keep your hardware store in business. However, just staying in business isn’t enough in a rapidly evolving retail world, so achieving improved KPI results is essential. In this Epicor eBook, you’ll learn about eight easy-to-use tools that go beyond traditional KPIs to quickly improve business results, including: • Reviewing store-to-store sales • Identifying your top 100 items • Monitoring excess inventory • Viewing items with cost change and no retail change Learn more about these tools, and discover what else you can do to improve your KPI results by downloading this Epicor eBook. Download now and go beyond retail KPIs.
Tags : 
retail analytics software, analytics on demand, kpi analytics software, retail kpi software, real time analytics, retail pos software, mobile pos, reporting software, pos technology
    
Epicor
Published By: ADP     Published Date: May 02, 2018
How do you create competitive advantage and protect it to build a successful organization for the future? Smart organizations are rethinking their strategies: how to elevate the strengths and productivity of their people and identify the right approach to protect their people and data.
Tags : 
talent acquisition, talent activation, security, data protection
    
ADP
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers can’t solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitor’s behalf. Sensitive fields like social security numbers and passwords can be blocked from the agent’s view so private information remains just that, private. Bold360’s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account – providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
With high user expectations shifting faster than ever, the software landscape is evolving at a feverish pace to deliver higher–quality software—and testing must be able to keep up. CA has worked with Paul Gerrard, Principal, Gerrard Consulting, to identify some of the new challenges that the digital economy presents for testing, and the trends that have emerged to meet them. We cover some of these topics in this e–book.
Tags : 
    
CA Technologies EMEA
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity
    
Nuance Communications
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, security management, security policies
    
Nuance Communications
Published By: Nuance Communications     Published Date: May 28, 2010
Register today to view to the webcast Proactive Notifications for Financial Services: Using Automated Customer Communications to Manage Risk and Retain Customers.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, financial services
    
Nuance Communications
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: Coupa Software Inc.     Published Date: May 11, 2018
To identify the strategic priorities of CFOs and senior finance professionals over the next two years, The Economist Intelligence Unit conducted a survey, commissioned by Coupa, of 507 finance executives across industries and located in the US, UK, France and Germany.
Tags : 
finance, finance strategy, financial management, finance technology, corporate finance, collaboration, information management
    
Coupa Software Inc.
Published By: Ability Commerce     Published Date: May 18, 2009
It always surprises me that as eCommerce marketers we give lip service to the importance of testing, buy many of us don't take the time to fine-tune our email programs. If you are able to identify a few elements through testing that resonate with your customers and then employ those insights in your ongoing program, the improvements may be sustainable over time.
Tags : 
ability commerce, seo, email frequency, email test, lead generation, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
    
SAP
Published By: Intel Corp.     Published Date: May 15, 2018
Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Meet end- user expectations and enterprise IT requirements using PCs equipped with next- generation Intel Core vPro processors.
Tags : 
    
Intel Corp.
Published By: SAP     Published Date: May 18, 2014
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
It seems strange to think that just a few years ago, the IT department was considered a supplier to the organization. Today, IT leaders are at the forefront of their companies’ march into the digital age. Technology is now recognized as a key enabler for achieving strategic business goals, including revenue growth, market expansion, and customer satisfaction; and IT leaders have risen to the challenge of simultaneously running the organization while identifying and leveraging innovative solutions that can drive growth.
Tags : 
it leaders, business goals, innovative solutions, customer satisfaction, infrastructure improvement
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 29, 2017
IT executives are in one of the most dynamic, challenging business environments of all time. The business expects speed; the IT function strives to keep up while pursuing innovation and efficiency. Many CIOs recognize that cloud is a possible solution to achieving both but they are uncertain about the best way to get there. Whether your company seeks to modernize IT, fuel innovation or accelerate growth, you’ll find that by identifying the most appropriate cloud journey for your organization, you can determine the best potential entry points to cloud migration as well as identify, prepare and prevent possible roadblocks. And, you’ll discover how the right cloud platform and partner can enable your success by leveraging different layers of the cloud to reach your desired business outcomes—and ultimately achieve true business transformation.
Tags : 
    
Oracle
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
There are quite a few things that your customers just aren’t telling you. But since you aren’t a telepath and you don’t own a Cerebro, the only thing you can do is wait for them to come to you with it. But not anymore. In this whitepaper, you'll learn the most important things that your support team should already know, but customers will never tell you, like: - Why you should design intelligence into your self-service experience - When you should resort to analytics and when "gut-feel" helps - How you can proactively manage, and prevent customer frustrations - What your core support bottlenecks are, and how to identify them - How to set a "Priority" driven support work-flow
Tags : 
    
Freshdesk
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory