access

Results 301 - 325 of 2627Sort Results By: Published Date | Title | Company Name

Oracle Tap CRM

Published By: Oracle     Published Date: Aug 08, 2013
Oracle Fusion Tap, a native iPad application, allows access to CRM data anytime and anywhere. Learn how Fusion Tap enables collaboration with colleagues and customers, usage of mapping and social networking applications, and more, all from your iPad.
Tags : 
oracle tap, oracle, crm, oracle fusion, ipad, crm, software development, knowledge management
    
Oracle

Oracle Cloud Improves Sales Information Access at Breg

Published By: Oracle     Published Date: Aug 15, 2013
Steve Romeo, VP of IT and Business Technology Solutions at Breg, a sports medicine company, discusses the benefits of accessing sales information in Outlook or on an iPad with Oracle Sales and Marketing Cloud Service.
Tags : 
oracle sales cloud, oracle, cloud, sales, sfa, crm, enterprise applications, business technology
    
Oracle

Sales Cloud Microsite

Published By: Oracle     Published Date: Aug 15, 2013
Increasing revenue while managing costs is a constant challenge for sales executives. Hiring more salespeople is often not an option. This free sales resource kit investigates some of the challenges facing today’s sales teams and ways in which sales can be optimised by using Oracle Sales Cloud to improve sales planning, coaching, prospecting and productivity. Download this free online resource tool to access videos, demos and whitepapers to see how you can sell smarter today.
Tags : 
sales cloud, revenue, sales executives, oracle, sales, enterprise applications, business technology
    
Oracle

Oracle Tap CRM

Published By: Oracle     Published Date: Aug 15, 2013
Oracle Fusion Tap, a native iPad application, allows access to CRM data anytime and anywhere. Learn how Fusion Tap enables collaboration with colleagues and customers, usage of mapping and social networking applications, and more, all from your iPad.
Tags : 
oracle tap, oracle, crm, oracle fusion, ipad, crm, enterprise applications, business technology
    
Oracle

Stop Unauthorized Privileged Access

Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi

Secure Enterprise Mobility to Prevent Data Loss and Unauthorized Access

Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi

Failure to Protect Keys and Certificates Undermines Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi

Top Five Ways Any Business Can Benefit From Box

Published By: Box     Published Date: Nov 24, 2015
One of the biggest problems with any organization is complete alignment among all teams. A lot of this breakdown is due to outdated methods of sharing important documents and information. Teams function best when they are able to access and collaborate on critical documents, presentations and files. Download this whitepaper to learn the top five ways any business can benefit from Box and see how it will allow your organization to operate faster across all departments to ensure everyone is aligned while driving growth to maintain security of your files to keep your projects running smoothly.
Tags : 
sharing documents, driving growth, maintain security, sharing files, security, enterprise applications
    
Box

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Scaling Identity Management to Ensure Customer Loyalty Program Success: Four Case Studies

Published By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
    
Akamai Technologies

Build vs. Buy: A Guide for Customer Identity and Access Management

Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies

Forrester Report: Building A Customer-Obsessed IAM Team

Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies

Evolve Or Die: Smart Ways To Address Changing Needs Of Customers

Published By: Pega     Published Date: May 24, 2016
Customers are evolving. They are evolving in the way they get information about products, what goes into making their purchase decision and ultimately how they buy. Businesses need to evolve and adapt how they manage their customer relationships. Customer Relationship Management (CRM) software was supposed to improve front-end customer engagement across marketing, sales and service. Unfortunately, most systems have the opposite result. Companies spend too much time integrating and maintaining disconnected systems and too little time nurturing relationships. Organizations need to transform their organizations from the inside out—embracing new processes and technologies that gathers, stores and gives them access to customer data so they gain more insight into their customers and therefore create more effective marketing and service programs. Download this Ebook and gain a better understanding of how a more robust CRM system can improve customer management.
Tags : 
    
Pega

Banks Are Losing Business At Alarming Rates. Complete Customer Experience Is Key To Turnaround - See

Published By: Pega     Published Date: May 24, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies

Addressing PCI Compliance: Through Privileged Access Management

Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies

Breaking the Kill Chain: Stopping Data Breaches with Privileged Access Management

Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies

How Magic Video, A Fast Growing Video Platform, Improves UX through Application Acceleration

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

How Alibaba Cloud's Express Connect helps enterprise build connections between cloud environments

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

How Alibaba Cloud’s CEN Helps Multinationals Build Cross-Region Hybrid Enterprise Networks.

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

Deep Packet Inspection for Wireless Access Points: Analyze. Control. Secure.

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity

Using Threat Analytics To Protect Privileged Access And Prevent Breaches

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies

How Can I Defend My Hybrid Enterprise From Data Breaches And Insider Threats?

Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
    
CA Technologies

Privileged Access Management: The Key To Protecting Your Business Amid Cybercrime’s Current Boom

Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies

Addressing PCI Compliance Through Privileged Access Management

Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.