clients

Results 126 - 150 of 509Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 17, 2017
Ce qu'il faut retenir de ce rapport: • L'opportunité de la fidélité : les 2/3 des consommateurs sont déjà membres d'au moins un programme de fidélité en matière de restauration • Les attentes des clients relatives à un programme de fidélité en matière de restauration • Les inconvénients qui freinent les consommateurs en premier lieu vis-à-vis de l'adhésion à des programmes de fidélité
Tags : 
carte magnétique, carte à tamponner, application mobile, numéro de téléphone, oracle
    
Oracle
Published By: Socialbakers     Published Date: Jan 20, 2015
In this exclusive report, you’ll find out how to use deep social media data to pursue new clients, perfect your data-driven pitches, and master the results with custom, easy-to-read reporting. It’s a data world, and agencies need to bring the best insights on the market to win new clients and keep existing business. This guide will get you started.
Tags : 
benefits of using social media data
    
Socialbakers
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, financial services, cloud based, electronic security, it protection, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Oct 12, 2017
Testing full recoveries of IT environments requires a proven methodology. Establishing and meeting RTOs, configuring a cloud recovery system, and tracking your changing environment are all critical components of a successful cloud recovery operation. In this expert Technical Guide, learn how Jamie Evans, Senior Manager of Disaster Recovery as a Service (DRaaS) for EVault, helps clients complete a full recovery of their systems.
Tags : 
cloud, recovery, vlan, data center, draas
    
Carbonite
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
Competitive threats and mushrooming client demands erode the bottom line for many agencies. This eBook provides actionable steps to help you keep your best employees and deliver profit growth, by: • Ensuring you get paid enough for every engagement • Empowering your staff to reign in over-servicing • Making your strategic value clear to clients
Tags : 
    
WorkBook from Deltek
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
Over–servicing is a very real issue for agencies. As a business whose value is judged on the quality of service, it is all too easy for agencies to always want to go the extra mile for clients, both happy and unhappy. Our research into the creative industry shows that while 75% of agency time is spent on client work, only 70% of that time is actually billed to clients. In this eGuide, we will show you 4 ways to take more control and avoid over–servicing in your agency.
Tags : 
    
WorkBook from Deltek
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
Marketing agencies are driven by creativity. But turning your agency’s project work into profit isn’t easy when you’re dealing with the pressures of growing client expectations, over servicing, scope creep and eroding margins. In this 3-minute video, Laura Ramos, Forrester VP and Principal Analyst, looks at the challenges and opportunities facing marketing agencies today and ways they can build strategic value with CMO clients to drive success.
Tags : 
    
WorkBook from Deltek
Published By: Trifacta     Published Date: Oct 25, 2018
Pourquoi le data preparation est-il un investissement rentable ? Lors de l’adoption d’une solution de préparation de données, il est important de mesurer le retour sur investissement. Dans ce guide, vous pourrez lire le témoignage de cinq clients de Trifacta de différents secteurs qui ont tous utilisé une approche différente afin de mesurer le retour sur investissement. Téléchargez notre guide pour mieux appréhender la rentabilité des plateformes de préparation des données qui permettent: Une réduction du temps de préparation des données Une réduction des coûts de licences de logiciels Un développement de son activité Une amélioration de la qualité des données Une mise sur le marché plus rapide des produits
Tags : 
    
Trifacta
Published By: Attunity     Published Date: Feb 12, 2019
This technical whitepaper by Radiant Advisors covers key findings from their work with a network of Fortune 1000 companies and clients from various industries. It assesses the major trends and tips to gain access to and optimize data streaming for more valuable insights. Read this report to learn from real-world successes in modern data integration, and better understand how to maximize the use of streaming data. You will also learn about the value of populating a cloud data lake with streaming operational data, leveraging database replication, automation and other key modern data integration techniques. Download this whitepaper today for about the latest approaches on modern data integration and streaming data technologies.
Tags : 
streaming data, cloud data lakes, cloud data lake, data lake, cloud, data lakes, streaming data, change data capture, cloud computing, modern data integration, data integration, data analytics, cloud-based data lake, enterprise data, self-service data
    
Attunity
Published By: Uberall     Published Date: Apr 12, 2019
Le store locator est une fonctionnalité incontournable de votre stratégie Web-to-Store : il convertit efficacement vos recherches en ligne en ventes hors ligne. Et bien qu’il puisse sembler être un outil relativement simple et fonctionnel, plusieurs facteurs peuvent littéralement révolutionner l’expérience utilisateur et démultiplier vos conversions. Uberall vous donne les clés d’un store locator optimisé : pour que vos clients vous trouvent - à chaque fois.
Tags : 
locator, uberall, store locator, location marketing, local listings, pages locales, ro-po
    
Uberall
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Rackspace     Published Date: Mar 07, 2019
SapientRazorfish is a global company that helps organizations in digital business transformation. For these enterprises, cloud migration is a mandate, and SapientRazorfish ensures the desired outcomes are achieved with Rackspace Fanatical Support for AWS services – to provide clients with expertise in planning, architecture services and counseling, migration, deployment, infrastructure maintenance and solution optimization.
Tags : 
    
Rackspace
Published By: Redstor UK     Published Date: Mar 12, 2018
Founded in 1810, with its UK headquarters in Liverpool, Hill Dickinson is an international commercial law firm with more than 1050 people across its offices in the UK, mainland Europe and Asia. Servicing a wide range of clients including multinational companies, major corporations and UK plcs, the firm delivers strategic advice and guidance spanning the full legal spectrum. Given the nature of Hill Dickinson’s client base, it has the responsibility to manage and store a significant amount of highly confidential data, therefore having an extremely secure and reliable backup solution is critical to the running of the organisation.
Tags : 
data, management, organisations, cloud, customer, commercial, law
    
Redstor UK
Published By: IBM     Published Date: Jul 21, 2016
This e-book explores the many uses of client insights for banking and wealth management. By using sophisticated analytics and cognitive capabilities, your organization can gain deep understanding of what matters most to your clients. Knowing them well helps to provide targeted, personalized service that they value and increases their loyalty. It’s a smart pathway for reducing churn and generating new revenue models through meaningful cross-selling opportunities in today’s customer-centric world.
Tags : 
ibm, banking, client insight, financial services, engagement, client insights, knowledge management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: EMC Corporation     Published Date: Mar 06, 2013
This technology profile examines how IT decision makers’ expectations and approaches are evolving to address increasing demands for higher levels of IT availability from their organizations and clients.
Tags : 
high availability, continuous availability, business continuity, risk management, data center
    
EMC Corporation
Published By: Workday     Published Date: Mar 02, 2018
Today’s banks, credit unions, asset management firms, lending companies, and other financial services businesses operate in a highly competitive and regulated environment. Servicing clients, introducing new products and channels, and opening new markets as well as having insight into your loans, investments, and deposits is critical to your bottom line. At the same time, employing the right people is what drives your future. Workday provides financial management, human capital management, and planning/ budgeting in a single cloud-based system to support your needs.
Tags : 
bank, credit unions, financial services, cloud-based system
    
Workday
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.