access

Results 101 - 125 of 2652Sort Results By: Published Date | Title | Company Name

Scaling Identity Management to Ensure Customer Loyalty Program Success: Four Case Studies

Published By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
    
Akamai Technologies

Build vs. Buy: A Guide for Customer Identity and Access Management

Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies

Forrester Report: Building A Customer-Obsessed IAM Team

Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies

Skalierung des Identitätsmanagements für den sicheren Erfolg von Kundenbindungsprogrammen

Published By: Akamai Technologies     Published Date: Jul 25, 2019
Treue- und Prämienprogramme sind effektive Mittel, mit denen Marken die Interaktion, Akquise und Treue von Mitgliedern steigern können. Erfahren Sie, warum führende Marken auf moderne CIAM-Lösungen (Customer Identity and Access Management) setzen und damit ihre Treueprogramme skalieren, das Nutzererlebnis verbessern und den ROI maximieren. In diesem Whitepaper erfahren Sie, welche Herausforderungen Sie bei der Transformation, Erweiterung und Skalierung von Kundenbindungs- und Prämienprogrammen und damit verbundenen Mitgliedschaftsinitiativen meistern müssen. Darüber hinaus stellen wir Ihnen Lösungen vor, die auf tiefgehenden Einblicken in vier praxisnahe Fallstudien basieren. Wir untersuchen die Anforderungen an eine unternehmensweite CIAM-Lösung und sprechen verwandte Themen wie „Entwicklung oder Kauf“ und „CIAM vs. IAM“ an. Anhand von vier verschiedenen Fallstudien – und den daraus resultierenden Identitätsmanagement-Lösungen, die durch das jeweilige Unternehmen implementiert wurde
Tags : 
    
Akamai Technologies

Bericht von Forrester: Building A Customer-Obsessed IAM Team

Published By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
    
Akamai Technologies

Selbst entwickeln oder kaufen? Ein Leitfaden für CIAM (Customer Identity and Access Management)

Published By: Akamai Technologies     Published Date: Jul 25, 2019
Heutzutage zählen die Identität der Kunden und die damit verbundenen persönlichen Daten zu den wichtigsten und wertvollsten Ressourcen jedes Unternehmens. Die Verwaltung dieser digitalen Identitäten (von der ersten Registrierung und Anmeldung bis zu den späteren Phasen der Kundenbeziehung) und die Verwertung der dazugehörigen Daten sind komplexe Aufgaben, die häufig als CIAM (Customer Identity and Access Management) bezeichnet werden. Wenn Unternehmen ein System zur Erfassung, Verwaltung und Nutzung von Daten zu digitalen Identitäten und Kunden implementieren, haben sie grundsätzlich zwei Möglichkeiten: Sie können ein eigenes Produkt entwickeln oder eine dedizierte Lösung von einem auf CIAM spezialisierten Anbieter kaufen. In diesem Whitepaper finden Sie eine detaillierte Analyse der CIAM-Implementierungsoptionen, darunter Folgendes: ? die wichtigsten Voraussetzungen für ein erfolgreiches CIAM-System für Unternehmen ? Vor- und Nachteile verschiedener Varianten der CIAM-Implementierun
Tags : 
    
Akamai Technologies

Bot Manager Advanced strategies to flexibly manage the long-term business and IT impact of bots

Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia

Advanced Strategies to Flexibly Manage the Long-Term Business and IT Impact of Bots

Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia

Aladdin eSafe Clientless Spyware Neutralizer

Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management, aladdin
    
Aladdin

Hardworking Wi-Fi for Healthcare

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Many healthcare organizations are looking at mobility as a means to improve treatment paths and patient outcomes. To achieve these goals, you need a Wi-Fi solution with the strength and intelligence to support the demands of digitization and the Internet of Things.
Tags : 
unified access, iot containment, intelligent fabric, smart analytics, healthcare
    
Alcatel Lucent Enterprise

Wireless for a New World

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth.
Tags : 
wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
    
Alcatel Lucent Enterprise

Wireless networks: Turning raw speed into great experiences

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Previously, wireless added a useful layer of mobility to your wired infrastructure. Now, you have users who may never connect with cables. Before, laptops and desktops were the primary tools of productivity in the office. These days, smartphones, tablets and apps are essential, whether users are on the move or at their desks.
Tags : 
device, iot, vlans, unified access, applications, analytics, healthcare
    
Alcatel Lucent Enterprise

Hardworking Technology: Wave 2

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
More agile and mobile ways of working need more agile and flexible networks. Wave 2 Wi-Fi, powered by ALE, delivers the capabilities needed to create future-ready organizations. Alcatel-Lucent OmniAccess® Stellar WLAN is optimized for Wave 2 infrastructures, with a distributed intelligence architecture, simplified management and support.
Tags : 
performance, iot readiness, simplicity, user centricity, analytics capability, unified management
    
Alcatel Lucent Enterprise

Wireless for a new world

Published By: Alcatel Lucent Enterprise     Published Date: Sep 07, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth. With contractors on site, and employees using their own devices, future-ready networks must support all kinds of devices, including legacy equipment. Airtime fair access provides optimal connectivity, even for older devices.
Tags : 
wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
    
Alcatel Lucent Enterprise

Virtualized Residential Gateway

Published By: Alcatel-Lucent     Published Date: Sep 29, 2015
Read more to learn how a Virtualized Residential Gateway is driving the delivery of enhanced residential services. This paper reviews the market drivers, evolved architecture model, benefits and capabilities (for each building block) of the vRGW solution.
Tags : 
alcatel lucent, vrgw, broadband, broadband access network, service delivery, service delivery architecture, residential gateway, bandwidth management, infrastructure, internetworking hardware, ip networks, network management, network performance, remote access, servers
    
Alcatel-Lucent

Why digital transformation is redefining how people, technology and devices interact in healthcare

Published By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE

Connected Education Preparing for the Digital Classroom

Published By: ALE USA, Inc     Published Date: Nov 01, 2019
Today, most students in primary and secondary schools have never experienced life without the internet or smartphones. This reality is reflected in the classroom where digital learning processes and experiences are enhancing traditional textbooks and upending conventional classroom teaching methods. Online lessons, testing and assessments are now part of most curricula. Laptops, tablets and smartphones have become primary instruction tools for students, who are downloading an increasing number of online apps to enhance their digital learning experience. Teachers and lecturers alike rely on robust, reliable Wi-Fi across their campus to access the full range of teaching tools available to them.
Tags : 
    
ALE USA, Inc

Cyber Security Checklist Part 2

Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic

How Magic Video, A Fast Growing Video Platform, Improves UX through Application Acceleration

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

How Alibaba Cloud's Express Connect helps enterprise build connections between cloud environments

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

How Alibaba Cloud’s CEN Helps Multinationals Build Cross-Region Hybrid Enterprise Networks.

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

Point of Sale (POS) Security: Defending against POS Malware

Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault

Practical Threat Management for Educational Institutions

Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault

How to Simplify PCI DSS Compliance with AlienVault USM

Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.