cloud client

Results 1 - 25 of 73Sort Results By: Published Date | Title | Company Name
Published By: Genesys     Published Date: Feb 12, 2019
Alors que les plateformes cloud gagnent en maturité, les entreprises sont de plus en plus ouvertes à lidée d’y migrer leurs systèmes critiques. Pour réduire leurs coûts bien sûr, mais aussi pour devenir plus agiles et plus évolutives. Comment concrétiser toutes ces promesses ? Et surtout, quelles sont les actions à engager pour enclencher l’inévitable migration de votre centre de contact ? Sachant qu’un parcours client de qualité commence par le choix du bon partenaire, en savez-vous suffisamment sur les différents fournisseurs sur les rangs pour prendre une décision éclairée ? Quels sont les besoins et contraintes de votre entreprise ? Quelles fonctionnalités propose votre fournisseur ? Vos cultures sont-elles compatibles ? Notre eBook vous invite à découvrir les 10 critères essentiels de sélection de votre partenaire pour réussir la migration de votre centre de contact dans le cloud.
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Sur un marché des centres de contacts cloud aussi vaste que changeant, il est souvent difficile de trouver la solution adaptée à votre entreprise. C’est pourquoi Ovum a conçu un outil intitulé « Matrice décisionnelle Ovum : comment sélectionner une solution de centre de contacts multicanal dans le cloud (édition 2017-18) ». Ce document a pour but de dresser un comparatif des grands acteurs de ce marché sur la base de leurs fonctions de routage des appels voix et de service client multicanal. Vous y découvrirez comment Genesys s’est imposé parmi les leaders grâce à des solutions pour les entreprises de toutes tailles et de tous secteurs à travers le monde. Au sommaire de la Matrice décisionnelle Ovum : Comparatif des plateformes technologiques des différentes solutions de centre de contacts dans le cloud Évaluation des capacités des fournisseurs dans les domaines de la gestion des interactions clients multicanaux et de l’analytique des données clients et d’entreprise Identification
Tags : 
    
Genesys
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Jusqu’à présent, les améliorations du datacenter se sont limitées à la réduction des coûts et à des solutions ponctuelles. La consolidation des serveurs, le Cloud computing, la virtualisation et l’implémentation de stockage Flash ont contribué à réduire la prolifération des serveurs, ainsi que les coûts de personnel et d’installations associés. Regroupant ressources de calcul, de stockage et de réseau au sein d’une même solution, les systèmes convergés se révèlent particulièrement efficaces dans la baisse des dépenses de personnel et de fonctionnement. Ces systèmes définis par logiciel (software-defined) exigent peu d’interventions humaines. Le code intégré dans le logiciel configure le matériel et automatise de nombreux processus autrefois manuels, ce qui réduit considérablement le risque d’erreurs humaines. Ensemble, ces technologies ont permis aux entreprises d’améliorer progressivement les processus et stratégies d’engagement client et de prestation de services.
Tags : 
    
Dell EMC & Intel
Published By: B Channels     Published Date: Apr 27, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete Hybrid Cloud ecosystem capabilities. Our solutions help our clients plan and deliver scalable Hybrid Cloud by showing an understanding of their market segments, then delivering on designing effective programs.
Tags : 
    
B Channels
Published By: CA Technologies     Published Date: Nov 07, 2014
Fournissez de nouveaux services métier sécurisés et améliorez l’expérience client. De plus en plus d’entreprises adoptent le Cloud, la technologie mobile et les réseaux sociaux pour élargir leurs activités, créer de nouveaux canaux commerciaux et améliorer les services aux clients.
Tags : 
accelerate service engagement, improve customer engagement, cloud, social networks, secure services, improve the customer experience, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.
Tags : 
business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, wireless, business technology, cloud computing, research
    
CA Technologies
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
The majority of enterprise software is now consumed via SaaS or cloud deployments. Despite a perception of simplicity in software acquisition, many cloud contracts require all the rigor and due diligence of contracts for on-premises licensed software. The Enterprise Cloud Buyer's Bill of Rights provides a tool for clients and vendors to change the tenor of contract negotiations from user subservience to an equal and collaborative long-term partnership.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite, it management
    
Netsuite DWASF Leads Display Q1 2015
Published By: Red Hat     Published Date: Feb 22, 2019
Linux est désormais le système d'exploitation de référence pour les infrastructures cloud et le moyen de distribution privilégié des applications modernes. Ceci est dû en partie à la fiabilité de cet environnement à la fois évolutif et sécurisé qui prend en charge de nombreuses applications. Red Hat Enterprise Linux s'appuie sur cette confiance et cette crédibilité pour proposer un environnement d'entreprise adapté et renforcé qui vous permet de réduire vos coûts d'exploitation et de bénéficier de performances supérieures en termes de fiabilité, de disponibilité et d'évolutivité. Le résultat est un meilleur retour sur investissement pour les entreprises clientes. Téléchargez l'étude d'IDC pour en savoir plus.
Tags : 
    
Red Hat
Published By: Datto Inc.     Published Date: Jan 31, 2013
Business continuity, data insurance, local storage flexibility, cost benefits, standards compliance and infrastructure control. This is just some of what Datto and hybrid cloud backup can do for you, and your clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: Datto Inc.     Published Date: May 08, 2013
What’s important to your SMB clients? This Brief looks at four key benefits that a?backup and disaster recovery (BDR) solution based on hybrid?cloud will deliver to your SMB clients.
Tags : 
hybrid cloud, business continuity, msp, managed service provider, backup and recovery, disaster recovery
    
Datto Inc.
Published By: MobileIron     Published Date: Aug 04, 2016
Office 365 est la suite de productivité cloud de Microsoft. Elle comprend une version en ligne des solutions les plus connues de Microsoft, comme Exchange et SharePoint, un espace de stockage avec OneDrive et plusieurs applications mobiles, dont Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Skype for Business et Yammer. Office 365 est au coeur de la stratégie d'évolution de Microsoft qui tend à devenir un fournisseur de solutions et de logiciels axés sur le mobile et le cloud. De nombreux clients MobileIron organisent également leur stratégie de productivité autour de cette suite en raison de l'utilisation croissante d'Office sur les appareils mobiles plutôt que sur les ordinateurs traditionnels. Dans ce contexte, ils exigent de pouvoir sécuriser et déployer Office 365 sur les appareils mobiles avec nos solutions.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: Mitel     Published Date: Nov 08, 2018
Travailler dans le secteur des technologies de l’information n’a jamais été aussi excitant, vu la façon dont la technologie améliore nos modes de travail et de communication au quotidien. Qu’il s’agisse des terminaux mobiles, des analyses en temps réel ou du cloud, les technologies actuelles s’adaptent parfaitement aux objectifs de l’entreprise et lui permettent d’augmenter sa productivité, de réduire ses coûts et d’améliorer le service à sa clientèle. L’ère du numérique redéfinit nos rôles en tant que dirigeants d’entreprise. De nos jours, il est indispensable de développer une plate-forme robuste proposant des solutions de communication et de collaboration simples et fluides.
Tags : 
wireless communication, audio conferencing, communications systems, video conferencing, cloud-based unified communications, enterprise voice, unified messaging, collaboration portal, business communications
    
Mitel
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, financial services, cloud based, electronic security, it protection, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care. • How built-in data encryption keeps your PHI, DICOM studies safe • Why more security pros are concerned with user behavior than cloud tools • What your organization should know about the cloud and compliance
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Carbonite     Published Date: Oct 12, 2017
Testing full recoveries of IT environments requires a proven methodology. Establishing and meeting RTOs, configuring a cloud recovery system, and tracking your changing environment are all critical components of a successful cloud recovery operation. In this expert Technical Guide, learn how Jamie Evans, Senior Manager of Disaster Recovery as a Service (DRaaS) for EVault, helps clients complete a full recovery of their systems.
Tags : 
cloud, recovery, vlan, data center, draas
    
Carbonite
Published By: Intel     Published Date: Aug 24, 2017
Para mantenerse delante de la competencia en el mercado de servicios de nube a un ritmo rápido y dirigido a costos, Le Cloud debe innovar nuevos servicios y flujos de ingreso para retener a sus clientes y dirigir utilidades. Al usar las soluciones de future-forward de centros de datos de Intel, Le Cloud puede reducir su latencia en las trans-codificaciones de video además de mejorar la experiencia de usuario en su transmisión del nuevo 4K y H-265 en los servicios de video en vivo que tienen millones de clientes actualmente.
Tags : 
    
Intel
Published By: Ping Identity     Published Date: Feb 12, 2016
A key technical underpinning of the cloud and the Internet of Things are Application Programming Interfaces (APIs). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the cloud.
Tags : 
    
Ping Identity
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
data security, accounting, cloud security, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
54% of UK office workers spend some of their time working away from the office, but how do you make sure they’re able to interact with clients and each other? You can’t afford to miss a beat. Download this e-Book for 5 tips to collaborate with your clients from anywhere, including how to: Use the cloud without compromising security Make client meetings feel more personal Customize your mobile alerts to ensure they’re helpful
Tags : 
remote work, client interaction, collaboration, cloud security, personalization
    
Citrix ShareFile
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept