mobile centric

Results 1 - 25 of 33Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model
    
Adobe
Published By: Adobe     Published Date: Feb 10, 2016
This white paper shows how to build a customer-centric model.
Tags : 
customer experience, mobility, mobile devices, marketing experiences, digital trends, marketing experiences, customer-centric model
    
Adobe
Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: IBM     Published Date: May 28, 2015
Transform your organization into a mobile enterprise for optimized business and customer-centric engagements
Tags : 
smarter process, data management, business models, blueworks live, big data, cloud computing, social collaboration
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: KPMG     Published Date: May 08, 2018
Many retailers have responded with a largely outdated omnichannel approach, focusing on integrating the physical and digital channels they use to interact with customers, when the problem is actually inside the business. Today's customers will remain loyal only if a brand offers them transparency and superior quality products while actively engaging with them to build a relationship they value. Meeting those needs has nothing to do with offering another physical, digital, or mobile channel and everything to do with running the business in a way that is customer-first and customer-centric.
Tags : 
    
KPMG
Published By: MobileIron     Published Date: Apr 22, 2019
Protect the modern enterprise with a mobile-centric, zero trust framework.
Tags : 
    
MobileIron
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: BMC Software     Published Date: May 19, 2014
Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions
    
BMC Software
Published By: BMC Software     Published Date: Mar 17, 2014
Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions
    
BMC Software
Published By: IBM     Published Date: Apr 15, 2015
With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.
Tags : 
ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric
    
IBM
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: Box     Published Date: Oct 18, 2012
In a mobile-centric world, IT has a new challenge on its hands: ensuring that users can access and collaborate on content anytime, anywhere an on any device. Here are the top five challenges, and how to overcome them.
Tags : 
box, mobile collaboration, access, bring your own device, content, sharing
    
Box
Published By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
    
IBM
Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing
    
Sage SalesLogix
Published By: VMware AirWatch     Published Date: May 18, 2016
When selecting an enterprise mobility platform, organizations should not only look at current mobile needs but also consider an extended roadmap that includes any future plans to develop apps, extend more business processes to mobile or expand collaboration with the extended enterprise. To prepare for a mobile-centric world, organizations today need a platform that is flexible, that scales, and that they can grow into as opposed to growing out of.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization
    
VMware AirWatch
Previous   1 2    Next    
Search Resource Library