User Experience Research Report: Comparative Analysis

Size: px
Start display at page:

Download "User Experience Research Report: Comparative Analysis"

Transcription

1 User Experience Research Report: Comparative Analysis Prepared for: Tom Haynes Written by: Apoorva Bansal Shruti Shetty Saaket Unadkat Krishna Vadrevu Main Contact: Krishna Vadrevu Word count: 3284

2 Table of Contents Executive Summary.. 3 Introduction Methods Findings, Evidence, & Recommendations.. 6 Discussion Conclusion References Appendices Appendix A. Comparative analysis profiles & chart.. 13

3 Executive Summary In order to identify the key and common components of a two-factor authentication solution, we conducted a comparative analysis between Duo Security and 8 competing products: SecureAuth, Entrust, Phone Factor, Authentify, Symantec, Google dual-authentication, RSA, and CloudSeal. We identified these competing products through a question in a previous survey of current Duo Security administrators asking for their input on which products they had used in the past and through market research to help identify other leading two-factor authentication companies. Product features from these competing products were analyzed and profiles of each company were created. We then analyzed these profiles to identify strengths in Duo Security s current offering as well as features offered by these other products that we Duo Security should explore to add value to their solution. Our key findings, listed below, are derived from these observations: 1. Case studies of enterprises using the solution are emphasized with several of the competitors. Duo Security can expand on their version of case studies, success stories, to include examples of enterprises using Duo Security in order to attract enterprise level customers 2. Workflow provisioning to allow for added control over who is enrolling into the system would be a significant addition to the administrative tools provided 3. Video guides in addition to written documentation would be a valuable addition for those that prefer a different mode of learning 4. In addition to the free trial currently offered, an interactive demo would help quickly highlight Duo Security s benefits and provide another channel of engagement 5. Duo Security should explore introducing a tablet application, as other products have already done so 6. Duo Security s website aesthetics, in subjective comparison with competitors, is a clear notch above the others with a more appealing and inviting vibe

4 Introduction Duo Security is an information security start-up that primarily focuses on providing two-factor authentication services to individuals and business. The service is aimed at simplifying the use of two-factor authentication for administrators by reducing the complex nature of setup and for users by providing them the ability to use their smart phone for authentication. Administrators are provided with an easy and direct way to sign up for a free 30-day trial to test the product, this process is critical to getting future customers to buy-in for a longer term contract. After signing up for a 30-day trial, administrators must create a new integration to specify details for the two-factor authentication to work. This process can be tedious and confusing; it is also usually the point in the service that is a major pain point for administrators. Making setup as easy as possible for administrators is a primary selling point for the available service; this makes it an imperative for Duo Security to provide an easy and flawless process for administrators to complete. As part of our investigation, we identified competitors that offered similar services as Duo Security. Part of our reasoning to do a comparative analysis was to identify what attracted customers to services alternative to Duo Security and what these competitor s services provided that could be of use for Duo Security to implement into their own solution. Additionally, we found it important to contrast the effectiveness of each service that competitors offered through online reviews or any documentation provided. The following services were evaluated and are explained in the methods section: Phone Factor, Authentify, SecureAuth, Entrust, Symantec, CloudSeal, RSA, and Google - all of these services except Google, a partial competitor, were identified as direct competitors. These competitors were evaluated based on metrics that were identified as pertinent for an information technology security service. Based off feedback from user interviews and surveys, the following metrics were deemed the most important and thus used to evaluate each competitor using a competitor feature matrix; Methods of Two-Factor Authentication, Usage, Cost, Supported Platforms, Administrative Features, Documentation Provided, Intended Users, Visual Aesthetics, and Support Services. Methods In order to understand the expectations of the user and to see where Duo stands in the market in comparison with other competitors, we performed a comparative analysis with eight other products that we thought could be competitors of Duo. There were three factors that we took into consideration while selecting the competitors: 1. Newman s taxonomy of the various types of competitors

5 2. Feedback from users who participated in our survey 3. Important aspects of Duo based on our research Previously, we categorized the competitors into three categories: Direct, Indirect and Partial, but after much deliberation decided to keep them divided as direct and partial only. We used Newman s taxonomy of the different types of comparisons to segregate the various products into these categories. Direct competitors: Products that offer the same functions in the same way. From the way we look at it, these are products that offer all of the functionalities that Duo has to offer in addition to certain other services. We narrowed down seven other products in the market that may come close to being direct competitors of Duo Security: Phone Factor: It is a mobile based service, similar to Duo Security that supports everything from VPNs to cloud services. It is free for up to 25 users and allows up to 500 authentications a month. Authentify: While Authentify may not cover as many functionalities as does Duo, it offers two factor authentication in the form of a phone call Secureauth: Two factor authentication is one of the many functionalities provided by this product. As opposed to Duo, the authentication methodology works within the system instead of being installed as a plugin to a system. Entrust: Unlike Duo, this product offers users many more functionalities in addition to two factor authentication, which they offer in the form of hardware tokens, smart cards, mobile software tokens and USB tokens. Symantec: Symantec offers a cloud based two factor authentication service and is used for most online transactions. Cloudseal: Cloudseal offers multi-factor authentication in the form of hardware tokens, google authenticator and cloud pass, a java powered application. RSA: Like Duo, they too provide two-factor authentication using software and hardware tokens. Partial competitors: These are competitors that offer only some of the functionalities that Duo offers. That would mean security systems that don t focus on dual-authentication, or only provide it for certain systems. Google two step authentication: While this product offers two factor authentication, it is constrained to only Google accounts. The methodology that we followed helped us analyze Duo Security and make a note of their shortcomings and benefits. A comparative analysis is basically performed to understand the positioning of a product with respect to other such products that are available in the market. Having performed the analysis, we were able to populate some key findings that highlight what features of Duo work in their favour as well as what other features should be included to improve the quality of the product and to generate better user feedback. During our survey, when asked what made them switch to Duo from other products, most users stated the ease of

6 setting up Duo on their respective systems and the cost as major factors. We did notice that these factors did indeed make Duo stand out as a better option for two-factor authentication since most competitors either charged a hefty price for the service or followed very complex procedures of setup. Our appendix provides an exhaustive list of the features of these competitors in terms of the methods of two factor authentication, usage, cost, platforms that they support, administrative features, documentation provided, intended users, visual aesthetics, support services and any additional feature that they may provide. Findings and Recommendations Finding #1 Competitors prominently emphasize the use of their products at the enterprise level, while Duo Security s presentation appeals to a wider population. This is both a positive and also a place for growth. Evidence & Recommendation: The majority of the competitors we analyzed clearly delineate their target market sectors, with the most common being: healthcare, banking & finance, and enterprise. Duo Security is no different, and adds public sector in their list of industries supported by their solution. However, one of the added benefits of Duo Security s site is that they intend to make their solution inviting to even small businesses and one-man operations, and not just the primary market sectors, an emphasis that we feel is a clear positive of Duo Security. This emphasis does not appear with any of the other competitors. In particular, SecureAuth, RSA, and Symantec have a decidedly enterprise-centric presentation. Nevertheless, Duo Security offers one of the strongest two factor authentication systems on the market, which is something that would clearly be highly desirable to enterprises. This is evidenced by Duo Security s client list, which includes large corporations such as Bechtel. So, while we feel that it is important for Duo Security to maintain its approachable appeal and presentation, we also recommend that additional information be presented that is targeted towards attracting enterprises, which also represent a more significant source of revenue. One possible method of doing this is to expand on the existing success stories that Duo lists under their solutions tab. The current success stories highlight the UofM Departmental Computing Organization(public sector), corporate security(enterprise), and the Royal Victorian Eye & Ear Hospital (healthcare). Adding more enterprise case studies (as well as some banking & finance examples to match with the current industries they ve identified as important) could help provide more documentation for someone that is exploring and curious to see if Duo Security would fit well for their enterprise. This addition would not detract from the general approachability of Duo Security, and can help bring in additional clients.

7 Finding #2 We found that some of the competitors (RSA, SecureAuth) gave the system administrators additional control over how they manage their users and groups. This was implemented through workflow provisioning profiles that allowed the admin/admins to assign user groups to different admins, based on select criteria. This adds convenience for the system admins to distribute the load of managing the users amongst themselves. Evidence & Recommendation: Duo Security already has the feature of organizing users into groups. This is a very nifty and useful administrative feature if used correctly. But a nice addition to it would be this sort of workflow provisioning, because currently, it doesn't appear that there is any way to manage the type/level of user who is enrolling into the system. Workflow provisioning helps tackle this problem in the following way - The admin can set rules such as if someone is registering from a particular profile, domain or IP pool, they will be directed to a specific admin for approval, who has more direct knowledge of these people and would be able to make a more informed call about whether these people should be accepted and if their information is correct. Thus, by adding this type of a feature, Duo Security s administrative solution will be more robust and will also allow admins fine grained control over their integration. Finding #3 We found that some of the competitors offered videos and forums to walk users through the process of setting up the serve on their respective systems. While products such as SecureAuth and Authentify provide video guidelines along with screenshots to help users, Cloudseal maintains an online forum where users doubts may be addressed by experts in the field. Duo on the other hand lacks any guidance in terms of a video tutorial or forum. While the documentation provided by Duo Security is pretty detailed and exhaustive, it would help to offer more guidance. Evidence & Recommendation: Our comparative analysis of Duo with the eight competitors stated above clearly state how Duo Security lacks the inclusion of video tutorials. This, supplemented with feedback from users who participated in the survey as well as our own experience in setting up the various products on our computers, lead us to believe that including videos and online forums would definitely be very helpful. While Duo has some nicely documented guides that pretty much focus on all aspects of the product, we must take into account, that not all users are very technically advanced. Video tutorials are an excellent way of providing guidance to such users. Having analyzed other products like SecureAuth, which does a great job at providing this form of guidance, we believe that Duo Security can better enhance the administrator s experience if this feature is added.

8 Members of a population vary on how they like to process information and learn new methods. By providing another channel of learning the features of the product and how to use it can help make Duo Security accessible and approachable to even more people. Finding #4 Multiple competitors provided individual demos for each of their products in addition to free trials. Evidence & Recommendation: A demo differs from a free trial as it provides a existing structure for the user to test a particular aspect of the product;; for example, Authentify provides users with a preset fictional corporation s online web portal which allows users to test the mobile application. RSA & PhoneFactor also provide demos that help users visualize how the product works without having to go through a registration process. Duo Security s easily accessible free trial, which can sometimes be set up and ready to test in as little as half an hour, already sets it apart from the majority of its competitors, most of whom require an interested user to first provide details and then wait for contact from a company representative to continue along the evaluation the process. In addition to the free trial, Duo Security should look into providing demos that allow users to quickly experience Duo s solution. More specifically, the benefit of providing these demos would allow administrators to eschew the overhead of getting the service set up in the first place. While going through registration and integration into the system can take 30 minutes or longer, a demo allows the user to try the product in 5 minutes. Duo Security s current user experience is top-notch with fantastic aesthetics - we believe that providing a demo would be a great way to allow a potential user to appreciate and understand this quickly, thus increasing the likelihood that they go through and try the more detailed trial. Finding #5 ipad and tablet apps for authentication are offered by several other competitors - Duo Security does not. Evidence & Recommendation: In the survey that we conducted prior to this analysis, we asked users for suggestions on how to improve the product, and several mentioned that Duo Security should explore a tablet application in addition to the mobile applications currently provided. In doing our comparative analysis, we noticed that several of Duo s competitors, specifically PhoneFactor(extended edition), Authentify, Symantec, Entrust, Google, and RSA all have tablet support. Increasingly, tablets are becoming on par with smart phones in terms of being trusted devices for users, and so introducing a tablet application for both ipad and Android would be a value addition to Duo Security s mobile offerings. From Duo Security s website and documentation, it appears that there is no tablet application offering, or if there is, this is not mentioned anywhere:

9 Figure 1. Duo Mobile's documentation reveals no tablet applications So, based on our survey results and our comparative analysis, we recommend Duo Security develops a tablet application through which users can utilize the Duo Push functionality. While a tablet application would not be able to provide SMS and voice-calling alternatives, users that want to use a tablet would be aware of this limitation but may prefer using a tablet regardless. Finding #6 Duo Security s website was better organized with a comparatively better set of visual aesthetics than all other services encountered. Evidence & Recommendation: While the measure of aesthetics is completely subjective, feedback from our survey convinced us to include aesthetics as a measure with which to compare these different products. Several survey respondents, when asked why they switched to Duo Security, took the time to mention in the other option that they found Duo Security s cool factor appealing. Our analysis corroborates these sentiments. The amount of time it took to understand and navigate Duo s website was much shorter than all of the identified competitors. Additionally, important information was organized in an easy to find and accessible way. This was not the case on most other competitors sites, where a significant amount of effort and searching was required to develop a basic profile of what was being offered. We believe that this gives Duo an added advantage over these other competitors, and we found it important to emphasize this positive. We believe that the addition of some of the prior recommendations, such as video tutorials and demos, can only help enhance this strength and make the site ven more appealing and inviting.

10 Discussion One of the main things we noticed when we were researching possible competitors was that only two of them had the same service profile. The others provided two factor authentication as a secondary service to add on to their existing security mechanism or as one of their authentication methods amongst many others. While these products still remain direct competitors to Duo Security (since they provide strong two factor authentication), it is important to note that they also offer other features. In our study, we suggested recommendations to Duo Security based on features that two or more other competitors have which could potentially benefit Duo. However, considering the nature of their business, it was not possible to obtain free trials for some of the competitors in time to evaluate them effectively. Therefore, we may have missed out on some other possible avenues of comparison. Duo does an excellent job at eliminating that step and allowing users to try things out themselves before/instead of involving them in a phone or discussion to explore possible options for them. Another thing we noticed was that most competitors targeted enterprise setups as potential target audience. While Duo does support those setups, they have tried to widen their user base by giving equal priority/visibility to simpler systems and integrations. We sought to incorporate this vision into our recommendations. Lastly, we discussed considering the method of integration of the selected products into the system as one factor of comparison. However, given the trouble we had in securing functioning trials with products, with which we could test integration, we determined not to go with this. Further, different systems will have different technical requirements for integration and different security measures required. While this was not within the expertise of our team to analyze, the integration into popular systems may be a next step that Duo Security might want to investigate in comparison with other products, to see if integration can be made easier and more streamlined. Conclusion An effective comparative analysis helps identify possible business competition and understand better where the client stands amongst other similar companies. Duo Security does a very good job with the signup process, initial setup and visual aesthetics. However, when compared to their competitors, we did find a few areas where their service could be improved upon. Our recommendations were to explore the possibility of a tablet based app, supplement the guides with video tutorials, better workflow provisioning and the ability to test integration demos before signing up for the trial account. Duo does a good job at highlighting the features that distinguish themselves from their competitors, but could do a better job at making the common features more conspicuous. These recommendations can thus be adapted to Duo Security's

11 existing model or act as avenues of focus for further improvements/research. Implementing these recommendations can help make the already excellent product that Duo Security offers even better.

12 References SecureAuth - Entrust PhoneFactor Authentify Symantec Google dual-authentication RSA Cloudseal -

13 Appendix The following spreadsheets show the profiles that we generated for each competitors based on our selected criteria of analyses. The first spreadsheet(2 pages) consists of profiles, the second spreadsheet shows which competitors have tablet applications(1 page), and the last shows if they have a demo(1 page).

14

15

16

17

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

STRATEGY MARKETING. Target MANAGEMENT VISION. Effective app store marketing strategies for your mobile VoIP app

STRATEGY MARKETING. Target MANAGEMENT VISION. Effective app store marketing strategies for your mobile VoIP app STRATEGY Target MARKETING MANAGEMENT VISION Effective app store marketing strategies for your mobile VoIP app 01 Effective app store marketing strategies for your mobile VoIP app These days it's not enough

More information

All You Need to Know about KiwiSchools

All You Need to Know about KiwiSchools All You Need to Know about KiwiSchools Table of Contents Welcome Your Investment with us Typical Website Timeframe The KiwiSchools Process - Building the perfect website for your school... Step 1: Discovering

More information

Facebook s Security Philosophy, and how Duo helps.

Facebook s Security Philosophy, and how Duo helps. Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across

More information

UNILY FOR SHAREPOINT ONLINE

UNILY FOR SHAREPOINT ONLINE The World s Largest SharePoint Product and Resource Directory UNILY FOR SHAREPOINT ONLINE A superior 5 star product. SharePoint Online has never looked better Product Reviewed by Ron Charity January 2015

More information

2012 European Cloud-Based Authentication Services New Product Innovation Award

2012 European Cloud-Based Authentication Services New Product Innovation Award 2012 2012 European Cloud-Based Authentication Services New Product Innovation Award 2012 Frost & Sullivan 1 We Accelerate Growth New Product Innovation Award Cloud-Based Authentication Service Europe,

More information

Desktop Management for the Small Enterprise

Desktop Management for the Small Enterprise Desktop Management for the Small Enterprise There are three key factors why desktop management for your small enterprise doesn't have to cost a fortune: time, money, and manpower. If you have less than

More information

The 4 Mindsets of Mobile Product Design. Scott Plewes

The 4 Mindsets of Mobile Product Design. Scott Plewes The 4 Mindsets of Mobile Product Design Scott Plewes With the recent popularity of smart phones and tablets, software product managers are under pressure to create mobile versions of their products for

More information

Second CRM Startup Pack

Second CRM Startup Pack Second CRM Startup Pack An Introduction Making Businesses Profitable www.secondcrm.com /secondcrm CRM for Startups Early stage Startups only focus on the idea and product and customer development is usually

More information

http://ubiqmobile.com

http://ubiqmobile.com Mobile Development Made Easy! http://ubiqmobile.com Ubiq Mobile Serves Businesses, Developers and Wireless Service Providers Businesses Be among the first to enter the mobile market! - Low development

More information

Inside Electronic Signature APIs

Inside Electronic Signature APIs Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider

More information

Integration Guide. Duo Security Authentication

Integration Guide. Duo Security Authentication Integration Guide Duo Security Authentication Revised: 21 January 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration

More information

Securing your Juniper SSL VPN with two-factor authentication.

Securing your Juniper SSL VPN with two-factor authentication. Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring

More information

LotusLive Engage Integrated online social networking and collaboration tools so you can work smarter before, during and after your meeting.

LotusLive Engage Integrated online social networking and collaboration tools so you can work smarter before, during and after your meeting. LotusLive Engage Integrated online social networking and collaboration tools so you can work smarter before, during and after your meeting. Ray Chan IBM China/HK Limited 2006 IBM Corporation Agenda Smarter

More information

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and

More information

FileMaker: Complete Platform to Create, Deploy, and Manage Custom ipad and iphone Solutions for Business

FileMaker: Complete Platform to Create, Deploy, and Manage Custom ipad and iphone Solutions for Business WHITE PAPER FileMaker: Complete Platform to Create, Deploy, and Manage Custom ipad and iphone Solutions for Business Executive Summary Business units and departments are developing custom ipad and iphone

More information

Zoho Projects. Social collaborative project management platform

Zoho Projects. Social collaborative project management platform Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its

More information

the ultimate guide to email marketing for insurance agents

the ultimate guide to email marketing for insurance agents the ultimate guide to email marketing for insurance agents what s in here? Email marketing & content marketing...3-4 Email marketing best practices...5 Email campaigns for insurance agents...6 AgencyBloc

More information

Changes in IT and Your Business are in Inevitable. Are you Ready? THE RIGHTANSWERS UNIFIED KNOWLEDGE PLATFORM IS A UNIQUE COMBINATION OF SOFTWARE,

Changes in IT and Your Business are in Inevitable. Are you Ready? THE RIGHTANSWERS UNIFIED KNOWLEDGE PLATFORM IS A UNIQUE COMBINATION OF SOFTWARE, Right Answers RightAnswers Unified Knowledge Platform The #1 Knowledge Management Solution R Answe Changes in IT and Your Business are in Inevitable. Are you Ready? THE RIGHTANSWERS UNIFIED KNOWLEDGE PLATFORM

More information

Collaborative Open Market to Place Objects at your Service

Collaborative Open Market to Place Objects at your Service Collaborative Open Market to Place Objects at your Service D6.2.1 Developer SDK First Version D6.2.2 Developer IDE First Version D6.3.1 Cross-platform GUI for end-user Fist Version Project Acronym Project

More information

Customizing and Integrating

Customizing and Integrating Customizing and Integrating Microsoft Dynamics CRM The Essential Guide 1 INTRODUCTION What s in this Guide Ease of Use and System Design: How easy is the system to use for your company s users? What are

More information

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6

More information

Online Meetings and Video Collaboration

Online Meetings and Video Collaboration Online Meetings and Video Collaboration Skype http://www.skype.com The World s Most Popular Video Calling Software. If at least one person on the call has a Premium account, it is possible to arrange a

More information

Courtesy of: VREB Virtual Real Estate Brokerage

Courtesy of: VREB Virtual Real Estate Brokerage Courtesy of: VREB Virtual Real Estate Brokerage Why Go Mobile? In today s world almost every industry is becoming more mobile friendly because of the huge increase in tablet and smart phone usage. The

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

linkedin s new company pages

linkedin s new company pages 1 a step-by-step guide to linkedin s new company pages How to Use LinkedIn Company Pages for Marketing A publication of 2 IS THIS BOOK RIGHT FOR ME? Not quite sure if this ebook is right for you? See the

More information

Are You Part of the. modernhomes.org

Are You Part of the. modernhomes.org Are You Part of the Internet A study by the National Association of Realtors, Profile of Home Buyers and Sellers, recently pointed out that 80 percent of homebuyers begin their home search on the Internet,

More information

Search Engine Optimization A Basic Idea & Its Uses

Search Engine Optimization A Basic Idea & Its Uses Search Engine Optimization A Basic Idea & Its Uses Copyright 2013 credencedigital.com 1 Introduction Today, people find Internet a very effective tool to search products services that are of interest and

More information

Business Startups - Advantages of Using Automation

Business Startups - Advantages of Using Automation CLOUD AUTOMATION How Cloud Automation Can Help You Scale Your IT Services TABLE OF CONTENTS Introduction 03 Business Benefits 07 Administrator Benefits 11 Technical Considerations 14 Conclusion 17 2 INTRODUCTION

More information

RRLC uses Google Apps for Nonprofits for. Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube

RRLC uses Google Apps for Nonprofits for. Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube RRLC uses Google Apps for Nonprofits for Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube Is Google for Nonprofits right for my organization? First, determine

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

Windows Intune Walkthrough: Windows Phone 8 Management

Windows Intune Walkthrough: Windows Phone 8 Management Windows Intune Walkthrough: Windows Phone 8 Management This document will review all the necessary steps to setup and manage Windows Phone 8 using the Windows Intune service. Note: If you want to test

More information

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA) Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected

More information

The approach Microsoft has taken with its Windows Phone 7 platform is

The approach Microsoft has taken with its Windows Phone 7 platform is 1 Developing an App for Windows Phone 7: An Overview In This Chapter Developing apps for Windows Phone 7 Taking care of your customers after the app is in their hands The approach Microsoft has taken with

More information

Using GitHub for Rally Apps (Mac Version)

Using GitHub for Rally Apps (Mac Version) Using GitHub for Rally Apps (Mac Version) SOURCE DOCUMENT (must have a rallydev.com email address to access and edit) Introduction Rally has a working relationship with GitHub to enable customer collaboration

More information

Biba Datasheet. Biba is a mobile collaboration tool that provides:

Biba Datasheet. Biba is a mobile collaboration tool that provides: Biba Datasheet WHAT IS BIBA? Biba is a mobile collaboration tool that provides: The biggest thing for us has been Biba AutoCall it makes a tremendous difference when the system takes care of when you join

More information

How to Choose the Best Inbox Integration for Salesforce

How to Choose the Best Inbox Integration for Salesforce How to Choose the Best Inbox Integration for Salesforce This guide is written for information technology specialists who are looking for ways to improve Salesforce productivity. Salesforce is one of the

More information

Hiring without hassle

Hiring without hassle Hiring without hassle Workable is everything you need to hire, in one place. From posting your job ad to managing candidates, it saves time on admin and creates time for people. WORKABLE IN BRIEF POST

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

NETGEAR ReadyNAS Duo/NV+ v2 Reviewer s Guide

NETGEAR ReadyNAS Duo/NV+ v2 Reviewer s Guide NETGEAR ReadyNAS Duo/NV+ v2 Reviewer s Guide T a b l e o f C o n t e n t s Contents...2 NETGEAR Contact Info...3 Product Category...3 Overview...3 What s New...3 ReadyDROP...3 Beyond Time Machine...5 Mobile

More information

Office 365 Fall Updates FAQ: New Office 365 Plans for SMBs and more!

Office 365 Fall Updates FAQ: New Office 365 Plans for SMBs and more! Office 365 Fall Updates FAQ: New Office 365 Plans for SMBs and more! Table of Contents Overview... 1 Overview of new Office 365 Business plans... 4 Implications for existing customers Open, Advisor, Direct...

More information

Special Edition for FastTrack Software

Special Edition for FastTrack Software 08/14 The magazine for professional system and networkadministration Special Edition for FastTrack Software Tested: FastTrack Automation Studio www.it-administrator.com TESTS I FastTrack Automation Studio

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Frequently Asked Questions Aerohive ID Manager

Frequently Asked Questions Aerohive ID Manager Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management

More information

Symantec Managed PKI Service Deployment Options

Symantec Managed PKI Service Deployment Options WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains

More information

Blackboard Pilot Report July 12, 2013

Blackboard Pilot Report July 12, 2013 Blackboard Pilot Report July 12, 2013 Introduction DeSales will adopt Blackboard Learn 9.1 as its Learning Management System to replace ANGEL in AY 2013-14. All courses starting on or after August 19th,

More information

FirstEnergy, generating excellent service.

FirstEnergy, generating excellent service. FirstEnergy, generating excellent service. Energy company optimizes websites, mobile websites, and apps with Adobe Experience Manager to improve customer interactions. With Adobe Experience Manager, our

More information

Quick Start Guide for OnTime Now

Quick Start Guide for OnTime Now Quick Start Guide for OnTime Now Set up your OnTime Now Account... 2 What you see... 3 Create a Project... 4 Add a Work Item from the main grid... 4 Launch the Planning Board... 5 Add a Work Item from

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Made for MSPs by an MSP

Made for MSPs by an MSP Made for MSPs by an MSP features & Pricing Guide THE END OF STICKY NOTE SECURITY www.passportalmsp.com lower costs improve security increase sales A cloud-based identity and password management solution

More information

The best sales presentation software for business

The best sales presentation software for business Everything you need to know about Presentia when researching presentation products Overview of the product Are you looking to improve your company s sales presentations and get away from boring PowerPoint?

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Find, track, pipeline, and manage your highly-skilled talent.

Find, track, pipeline, and manage your highly-skilled talent. Jobvite Engage: High Tech Find, track, pipeline, and manage your highly-skilled talent. As competition heats up for hard-to-find skills across the tech industry everything from precious engineering and

More information

Enterprise Solutions IT Services 4132 Heartleaf Ln Naperville, IL 60564

Enterprise Solutions IT Services 4132 Heartleaf Ln Naperville, IL 60564 Who we are Ensar Solutions Inc. is a Microsoft focused IT Services company. Our business is built around an exclusive focus on Microsoft SharePoint, Dynamics CRM, AX, Social, Azure and Mobile solutions.

More information

How to Choose the Best Inbox Integration for Salesforce

How to Choose the Best Inbox Integration for Salesforce How to Choose the Best Inbox Integration for This guide is written for information technology specialists who are looking for ways to improve productivity. is one of the most innovative and fastest growing

More information

Bigger Picture Telstra 2013 Sustainability Reporting Series. Customer experience

Bigger Picture Telstra 2013 Sustainability Reporting Series. Customer experience Bigger Picture Telstra 2013 Sustainability Reporting Series Customer experience PUTTING OUR CUSTOMERS AT THE CENTRE CONTENTS Highlights 03 Context 04 Customer service 05 Customer advocacy 05 Managing bill

More information

Associations today face more challenges and demands than ever

Associations today face more challenges and demands than ever Associations today face more challenges and demands than ever before to deliver real value to their membership base. Professional development and education are aspects of an association s mission that

More information

The 5-Minute Guide to Customer Support

The 5-Minute Guide to Customer Support Tame the Email Monster Moving Customer Support from Email to a Help Desk to Boost Efficiency July 2011 Table of Contents Executive Summary... 3 The Global Inbox... 4 Does Email Scale As Your Business Grows?...

More information

ipads in the Secondary Classroom

ipads in the Secondary Classroom ipads in the Secondary Classroom Agenda SAMR Model ipad as a Teacher Tool Substitution with the ipad Augmentation with the ipad Modification with the ipad Redefinition with the ipad Sharing Student Work

More information

Terminology page. All available site plans can be seen here: http://www.adobe.com/products/business-catalyst/buyingguide-subscriptions.

Terminology page. All available site plans can be seen here: http://www.adobe.com/products/business-catalyst/buyingguide-subscriptions. Terminology page Partner Portal Centralized console designed to help you build and manage your design business. You can view your clients sites and create new sites with the click of a button. You can

More information

TARGETPROCESS HELP DESK PORTAL

TARGETPROCESS HELP DESK PORTAL TARGETPROCESS HELP DESK PORTAL v.2.17 User Guide This document describes TargetProcess Help Desk Portal functionality and provides information about TargetProcess Help Desk Portal usage. 1 HELP DESK PORTAL...2

More information

/// FRICTIONLESS BUSINESS USING I.T. TO STREAMLINE OPERATIONS

/// FRICTIONLESS BUSINESS USING I.T. TO STREAMLINE OPERATIONS WHITE PAPER /// FRICTIONLESS BUSINESS USING I.T. TO STREAMLINE OPERATIONS To move fast in today s market companies must work to remove areas of friction that slow their business down. A key element to

More information

Cloud Apps to Improve Agency Efficiency

Cloud Apps to Improve Agency Efficiency Cloud Apps to Improve Agency Efficiency CONTENTS Introduction: Cloud Apps What Can They Do for You?...3 Benefits of Using Cloud Apps...4 Apps for Your Daily Operations...6 Document Storage Apps...9 Apps

More information

The Quick Guide to Partner

The Quick Guide to Partner QUICK GUIDE Optimize Partner Recruitment & On-Boarding The Quick Guide to Partner Recruitment & On-Boarding #channelchoices The Relayware Quick Guide to Partner Recruitment & On-Boarding 2 INTRODUCTION

More information

FileMaker Business Alliance Program Guide

FileMaker Business Alliance Program Guide FileMaker Business Alliance Program Guide FileMaker Business Alliance Guide Together with our FBA partners, we strive to enhance every customer s journey, expand the FileMaker community and deliver outstanding

More information

Choosing an LMS FOR EMPLOYEE TRAINING

Choosing an LMS FOR EMPLOYEE TRAINING Choosing an LMS FOR EMPLOYEE TRAINING As organizations grow it becomes more challenging to scale your internal learning culture. You must be certain that your staff is trained in the entire organizational

More information

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services Professional Development Training Course Catalog Fall 2013 ITS Offered by Furman University Information Technology Services in collaboration with Center for Teaching and Learning And the Library These

More information

Dynamic Resource Management in Cloud Environment

Dynamic Resource Management in Cloud Environment Dynamic Resource Management in Cloud Environment Hitoshi Matsumoto Yutaka Ezaki Fujitsu has been providing ServerView Resource Orchestrator (ROR) since June 2010 as a software package for constructing

More information

Are Passwords Passé?

Are Passwords Passé? Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon

More information

Customer Timeline - New in Summer 2012. Web Lead Capture - New in Summer 2012. Built-In Dashboards - New in Summer 2012

Customer Timeline - New in Summer 2012. Web Lead Capture - New in Summer 2012. Built-In Dashboards - New in Summer 2012 What s New Maximizer CRM 12 Features New Mobile Access User Interface Enhanced Mobile Access Appointment Management Enhanced Web Access User Interface Improved Web Access Speed & Navigation LinkedIn Integration

More information

Mobile Apps: What Consumers Really Need and Want. A Global Study of Consumers Expectations and Experiences of Mobile Applications

Mobile Apps: What Consumers Really Need and Want. A Global Study of Consumers Expectations and Experiences of Mobile Applications Mobile Apps: What Consumers Really Need and Want A Global Study of Consumers Expectations and Experiences of Mobile Applications The Difference Between a Mobile App and a Mobile Website Before we evaluate

More information

CRM + AGENT ADOPTION = PRODUCTIVITY

CRM + AGENT ADOPTION = PRODUCTIVITY CRM + AGENT ADOPTION = PRODUCTIVITY 1 INTRODUCTION The technology team at REAL Trends undoubtedly sees value in Customer Relationship Management (CRM) systems. Whether your company is big or small, independent

More information

Adobe Summit 2015 Lab 718: Managing Mobile Apps: A PhoneGap Enterprise Introduction for Marketers

Adobe Summit 2015 Lab 718: Managing Mobile Apps: A PhoneGap Enterprise Introduction for Marketers Adobe Summit 2015 Lab 718: Managing Mobile Apps: A PhoneGap Enterprise Introduction for Marketers 1 INTRODUCTION GOAL OBJECTIVES MODULE 1 AEM & PHONEGAP ENTERPRISE INTRODUCTION LESSON 1- AEM BASICS OVERVIEW

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

HOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012

HOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012 HOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012 INTRODUCTION The use of cloud application providers or Software-as-a-Service (SaaS) applications is growing rapidly. Many organizations

More information

Creating a DUO MFA Service in AWS

Creating a DUO MFA Service in AWS Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013

More information

Hosted Workspaces Demo Guide for Citrix Service Provider Partners

Hosted Workspaces Demo Guide for Citrix Service Provider Partners Hosted Workspaces Demo Guide for Citrix Service Provider Partners Deliver a great hosted workspaces customer demo that includes Desktops-as-a-Service, virtual applications, file sharing and sync and Mobile

More information

Search engine optimization and CRM features:

Search engine optimization and CRM features: Everything you need to know about Bigcommerce Hosting Bigcommerce Why is it the best E-commerce Solution? E-commerce today is one of the biggest and most profitable industries on the internet. With such

More information

Using Google Analytics

Using Google Analytics Using Google Analytics Overview Google Analytics is a free tracking application used to monitor visitors to your website in order to provide site designers with a fuller knowledge of their audience. At

More information

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 èè How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 Table of Contents 1. General overview... 3 1.1. Installing the plugin... 3 1.2. Testing the plugin with the

More information

Proposal Document TitleDocument Version 1.0 TitleDocument

Proposal Document TitleDocument Version 1.0 TitleDocument G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public

More information

Best Practices of Project Management and Tracking Tools

Best Practices of Project Management and Tracking Tools Best Practices of Project Management and Tracking Tools A solid Lean Six Sigma deployment requires a mechanism for recording, storing, viewing, and reporting on the on going project work. This level of

More information

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine

More information

Multi-Factor Authentication for first time users

Multi-Factor Authentication for first time users Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor

More information

Tables in the Cloud. By Larry Ng

Tables in the Cloud. By Larry Ng Tables in the Cloud By Larry Ng The Idea There has been much discussion about Big Data and the associated intricacies of how it can be mined, organized, stored, analyzed and visualized with the latest

More information

Content Marketing in 2014:

Content Marketing in 2014: Benchmark Report Content Marketing in 2014: Sponsored By: 2014 Demand Metric Research Corporation in Partnership with Ascend2. All Rights Reserved. TABLE OF CONTENTS 3 Executive Summary 10 Content Campaign

More information

WHITE PAPER MULTI-CHANNEL CAMPAIGNS IN A CONNECTED WORLD. Create and deploy IT solutions for business

WHITE PAPER MULTI-CHANNEL CAMPAIGNS IN A CONNECTED WORLD. Create and deploy IT solutions for business WHITE PAPER MULTI-CHANNEL CAMPAIGNS IN A CONNECTED WORLD White paper - Multi-Channel Campaigns in a Connected World - Prodware 1 Create and deploy IT solutions for business Navigating Multi-channel Marketing

More information

California Mobile Gallery

California Mobile Gallery California Mobile Gallery NASCIO Category: Government to Citizen Carlos Ramos, State Chief Information Officer California Department of Technology Project Initiation: January 2014 Project Completion: August

More information

Utilise one central repository for a diverse range of content EQUELLA. www.equella.com

Utilise one central repository for a diverse range of content EQUELLA. www.equella.com Utilise one central repository for a diverse range of content EQUELLA C O N T E N T P L A T F O R M www.equella.com What is EQUELLA? EQUELLA, our web-based platform provides one central location for the

More information

Get Your Business Moving. In partnership with Nomis Connections

Get Your Business Moving. In partnership with Nomis Connections Get Your Business Moving In partnership with Nomis Connections Get Your Business Moving Mobile devices + the cloud = biggest business opportunity to come along in quite a while Businesses have more opportunity

More information

MARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan.

MARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan. MARKETING KUNG FU: 25 Things Every Marketing Department Needs Use this checklist as a guide or as a starting point for your complete marketing plan. 1 Your Business Plan How big is your market opportunity?

More information

5 Quick Tips For Small Business Entrepreneurs In 2015

5 Quick Tips For Small Business Entrepreneurs In 2015 Quick Tips for Small Business Entrepreneurs In 2015 Advice you can t afford to miss! 1 Table of Contents 1. Introduction 3 2015 The Year of Customer Experience 2. Tips for Marketing Your Product Better:

More information

Zoho Recruit. Recruitment and applicant tracking software

Zoho Recruit. Recruitment and applicant tracking software Zoho Recruit is an all- in- one recruitment and applicant tracking system that caters to the needs of both recruiting agencies and in- house corporate recruiters by simplifying the entire hiring process,

More information