trust

Results 451 - 475 of 1029Sort Results By: Published Date | Title | Company Name

How can you turbocharge your digital transformation through always on customer experiences?

Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19

How Employee Advocacy Boosts Content Marketing

Published By: Smarp     Published Date: Feb 22, 2019
Employee Advocacy relies on individual expertise on social media to support companies’ and individuals’ branding needs. All of this is done through content, accessible to all those who are part of the Employee Advocacy program. How exactly do Employee Advocacy and content marketing go together? There are four aspects that make Employee Advocacy highly relevant to content marketing efforts. 1. Alignment around a shared content strategy 2. Measuring Results 3. Boosting contents reach and engagement 4. Trust and authenticity
Tags : 
content marketing, employee advocacy, social media, content visibility, brand visibility
    
Smarp

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, authentication
    
Symantec

How Magic Video, A Fast Growing Video Platform, Improves UX through Application Acceleration

Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA

How Medical Devices Risk Patient Safety and Security

Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software

How Non-profit Organizations Can Achieve Transparency and Accountability

Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
nonprofit, ngo, erp, financial transparency, accountability, social impact
    
Unit4

How Non-profit Organizations Can Achieve Transparency and Accountability

Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
    
Unit4

How Non-profit Organizations Can Achieve Transparency and Accountability

Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
    
Unit4

How Pokémon Secures Data for Hundreds of Millions of Users with Sumo Logic

Published By: AWS     Published Date: Oct 07, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS

How Pokémon Secures Data for Hundreds of Millions of Users with Sumo Logic

Published By: AWS     Published Date: Oct 09, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS

How Protecting Your Customers' Privacy Builds Your Business

Published By: TRUSTe     Published Date: Jul 24, 2009
Whether registering for downloads or e-newsletters, re-ordering or renewing, or telling their friends, customers who feel more confident to click, learn, and shop online, spend more. See how Truste privacy products and programs have helped businesses of all sizes increase conversions, order value, and customer engagement throughout the customer lifecycle.
Tags : 
truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions, certification, registrations
    
TRUSTe

How SunTrust Bank Wove Event Detection into an Effective Event-based Marketing Program

Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM

How to Architect “Zero Trust” Network Segmentation in Industrial Control Systems

Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks

How to Build a DDoS Response Plan

Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula

How to Build a Great SaaS Business

Published By: Salesforce     Published Date: Aug 01, 2016
This e-book will help you learn how to build a great software as a service (SaaS) business. It will show you how partnering with Salesforce gives you an unparalleled advantage in the marketplace to build, market, sell, and grow faster.
Tags : 
salesforce, saas, software as a service, business growth, trusted business apps, software development, knowledge management, enterprise applications, business technology
    
Salesforce

How to Build a Testing Team That Performs in a Changing Corporate Environment

Published By: Tricentis     Published Date: Mar 13, 2018
Testing is critical to the success of any application. In fact, your software is only as good as the testing team behind it and their ability to identify bugs before they find their way into production. Practically speaking, that means that building and nurturing an effective testing team is mission critical. But, of course, doing so is a lot easier said than done. That's because to be successful, today’s testing teams need to be cross-functional, efficient, and focused on the right things. They also have to be fully bought in and worthy of deep trust. As a result, finding the right candidates can be a challenge, so you have to get creative. Not only that, to attract and retain the best talent, you need to keep them motivated by giving them ample opportunities to learn and advance their career, while not weighing them down with the burden of time-consuming and unnecessary administrative tasks. Instead, you want to equip your team with the right tools to enable and empower them.
Tags : 
    
Tricentis

How To Choose A Certificate Authority for Safer Web Security

Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities, security
    
GeoTrust

How to Create a Healthy Expense Report Culture

Published By: AppZen     Published Date: Jun 17, 2019
Setting clear expectations and guidelines around travel and entertainment expenses (T&E) is crucial to establishing a healthy company culture. Employees want to feel at ease laying out money for the company, feeling confident they will get reimbursed quickly. Crafting a comprehensive T&E policy and making sure it’s available to all employees is an important first step, but a policy alone isn’t enough — a culture of anxiety and mistrust can emerge from even the most carefully constructed policies.
Tags : 
    
AppZen

How to Create a Healthy Expense Report Culture

Published By: AppZen     Published Date: Oct 21, 2019
Building an atmosphere of trust, transparency, and efficiency around expense reports helps contribute to a similar atmosphere in other parts of the organization.
Tags : 
    
AppZen

How to Differentiate Your Customer Service

Published By: Kustomer     Published Date: Aug 27, 2019
Differentiating your customer service starts with one thing: improving the agent experience. Learn the importance of empowering service teams with better processes and technology, to focus on delivering the type of support that builds trust, loyalty and economic value.
Tags : 
'customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”, “customer support agents”, “customer service agents”, “customer experience agents”
    
Kustomer

How to Engage the Emotions of Your Buyers

Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most when making decisions, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom would indicate that “hard” elements, such as details around cost, quality and efficiency, are more compelling to decision-makers, this new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, senior executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they primarily relied on to help them make decisions.
Tags : 
    
Tyco Integrated Security

How to Engage the Emotions of Your Buyers

Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on “soft” factors to help guide them.
Tags : 
buyers, emotion, company culture, reputation, soft factors, hard factors
    
gyro

How to make summertime shoppers feel safe online and boost your sales at the same time

Published By: Symantec     Published Date: Jun 24, 2015
This white paper illustrates how there’s a better way to inspire consumer confidence and satisfaction, all while increasing conversions, order value, and repeat buyers on your site.
Tags : 
online security, online shopping, customer trust, sales, online purchases
    
Symantec

How to Simplify SSL Certificate Management

Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
ssl
    
Symantec Corporation

How to spot rogue anti-malware products: What you need to know before you click

Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security, intrustion detection, anti-virus, access control, anti virus, application security, hacker detection, security management
    
GFI Software
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.