User Experience Research Report: Comparative Analysis
|
|
- Virgil Benson
- 8 years ago
- Views:
Transcription
1 User Experience Research Report: Comparative Analysis Prepared for: Tom Haynes Written by: Apoorva Bansal Shruti Shetty Saaket Unadkat Krishna Vadrevu Main Contact: Krishna Vadrevu Word count: 3284
2 Table of Contents Executive Summary.. 3 Introduction Methods Findings, Evidence, & Recommendations.. 6 Discussion Conclusion References Appendices Appendix A. Comparative analysis profiles & chart.. 13
3 Executive Summary In order to identify the key and common components of a two-factor authentication solution, we conducted a comparative analysis between Duo Security and 8 competing products: SecureAuth, Entrust, Phone Factor, Authentify, Symantec, Google dual-authentication, RSA, and CloudSeal. We identified these competing products through a question in a previous survey of current Duo Security administrators asking for their input on which products they had used in the past and through market research to help identify other leading two-factor authentication companies. Product features from these competing products were analyzed and profiles of each company were created. We then analyzed these profiles to identify strengths in Duo Security s current offering as well as features offered by these other products that we Duo Security should explore to add value to their solution. Our key findings, listed below, are derived from these observations: 1. Case studies of enterprises using the solution are emphasized with several of the competitors. Duo Security can expand on their version of case studies, success stories, to include examples of enterprises using Duo Security in order to attract enterprise level customers 2. Workflow provisioning to allow for added control over who is enrolling into the system would be a significant addition to the administrative tools provided 3. Video guides in addition to written documentation would be a valuable addition for those that prefer a different mode of learning 4. In addition to the free trial currently offered, an interactive demo would help quickly highlight Duo Security s benefits and provide another channel of engagement 5. Duo Security should explore introducing a tablet application, as other products have already done so 6. Duo Security s website aesthetics, in subjective comparison with competitors, is a clear notch above the others with a more appealing and inviting vibe
4 Introduction Duo Security is an information security start-up that primarily focuses on providing two-factor authentication services to individuals and business. The service is aimed at simplifying the use of two-factor authentication for administrators by reducing the complex nature of setup and for users by providing them the ability to use their smart phone for authentication. Administrators are provided with an easy and direct way to sign up for a free 30-day trial to test the product, this process is critical to getting future customers to buy-in for a longer term contract. After signing up for a 30-day trial, administrators must create a new integration to specify details for the two-factor authentication to work. This process can be tedious and confusing; it is also usually the point in the service that is a major pain point for administrators. Making setup as easy as possible for administrators is a primary selling point for the available service; this makes it an imperative for Duo Security to provide an easy and flawless process for administrators to complete. As part of our investigation, we identified competitors that offered similar services as Duo Security. Part of our reasoning to do a comparative analysis was to identify what attracted customers to services alternative to Duo Security and what these competitor s services provided that could be of use for Duo Security to implement into their own solution. Additionally, we found it important to contrast the effectiveness of each service that competitors offered through online reviews or any documentation provided. The following services were evaluated and are explained in the methods section: Phone Factor, Authentify, SecureAuth, Entrust, Symantec, CloudSeal, RSA, and Google - all of these services except Google, a partial competitor, were identified as direct competitors. These competitors were evaluated based on metrics that were identified as pertinent for an information technology security service. Based off feedback from user interviews and surveys, the following metrics were deemed the most important and thus used to evaluate each competitor using a competitor feature matrix; Methods of Two-Factor Authentication, Usage, Cost, Supported Platforms, Administrative Features, Documentation Provided, Intended Users, Visual Aesthetics, and Support Services. Methods In order to understand the expectations of the user and to see where Duo stands in the market in comparison with other competitors, we performed a comparative analysis with eight other products that we thought could be competitors of Duo. There were three factors that we took into consideration while selecting the competitors: 1. Newman s taxonomy of the various types of competitors
5 2. Feedback from users who participated in our survey 3. Important aspects of Duo based on our research Previously, we categorized the competitors into three categories: Direct, Indirect and Partial, but after much deliberation decided to keep them divided as direct and partial only. We used Newman s taxonomy of the different types of comparisons to segregate the various products into these categories. Direct competitors: Products that offer the same functions in the same way. From the way we look at it, these are products that offer all of the functionalities that Duo has to offer in addition to certain other services. We narrowed down seven other products in the market that may come close to being direct competitors of Duo Security: Phone Factor: It is a mobile based service, similar to Duo Security that supports everything from VPNs to cloud services. It is free for up to 25 users and allows up to 500 authentications a month. Authentify: While Authentify may not cover as many functionalities as does Duo, it offers two factor authentication in the form of a phone call Secureauth: Two factor authentication is one of the many functionalities provided by this product. As opposed to Duo, the authentication methodology works within the system instead of being installed as a plugin to a system. Entrust: Unlike Duo, this product offers users many more functionalities in addition to two factor authentication, which they offer in the form of hardware tokens, smart cards, mobile software tokens and USB tokens. Symantec: Symantec offers a cloud based two factor authentication service and is used for most online transactions. Cloudseal: Cloudseal offers multi-factor authentication in the form of hardware tokens, google authenticator and cloud pass, a java powered application. RSA: Like Duo, they too provide two-factor authentication using software and hardware tokens. Partial competitors: These are competitors that offer only some of the functionalities that Duo offers. That would mean security systems that don t focus on dual-authentication, or only provide it for certain systems. Google two step authentication: While this product offers two factor authentication, it is constrained to only Google accounts. The methodology that we followed helped us analyze Duo Security and make a note of their shortcomings and benefits. A comparative analysis is basically performed to understand the positioning of a product with respect to other such products that are available in the market. Having performed the analysis, we were able to populate some key findings that highlight what features of Duo work in their favour as well as what other features should be included to improve the quality of the product and to generate better user feedback. During our survey, when asked what made them switch to Duo from other products, most users stated the ease of
6 setting up Duo on their respective systems and the cost as major factors. We did notice that these factors did indeed make Duo stand out as a better option for two-factor authentication since most competitors either charged a hefty price for the service or followed very complex procedures of setup. Our appendix provides an exhaustive list of the features of these competitors in terms of the methods of two factor authentication, usage, cost, platforms that they support, administrative features, documentation provided, intended users, visual aesthetics, support services and any additional feature that they may provide. Findings and Recommendations Finding #1 Competitors prominently emphasize the use of their products at the enterprise level, while Duo Security s presentation appeals to a wider population. This is both a positive and also a place for growth. Evidence & Recommendation: The majority of the competitors we analyzed clearly delineate their target market sectors, with the most common being: healthcare, banking & finance, and enterprise. Duo Security is no different, and adds public sector in their list of industries supported by their solution. However, one of the added benefits of Duo Security s site is that they intend to make their solution inviting to even small businesses and one-man operations, and not just the primary market sectors, an emphasis that we feel is a clear positive of Duo Security. This emphasis does not appear with any of the other competitors. In particular, SecureAuth, RSA, and Symantec have a decidedly enterprise-centric presentation. Nevertheless, Duo Security offers one of the strongest two factor authentication systems on the market, which is something that would clearly be highly desirable to enterprises. This is evidenced by Duo Security s client list, which includes large corporations such as Bechtel. So, while we feel that it is important for Duo Security to maintain its approachable appeal and presentation, we also recommend that additional information be presented that is targeted towards attracting enterprises, which also represent a more significant source of revenue. One possible method of doing this is to expand on the existing success stories that Duo lists under their solutions tab. The current success stories highlight the UofM Departmental Computing Organization(public sector), corporate security(enterprise), and the Royal Victorian Eye & Ear Hospital (healthcare). Adding more enterprise case studies (as well as some banking & finance examples to match with the current industries they ve identified as important) could help provide more documentation for someone that is exploring and curious to see if Duo Security would fit well for their enterprise. This addition would not detract from the general approachability of Duo Security, and can help bring in additional clients.
7 Finding #2 We found that some of the competitors (RSA, SecureAuth) gave the system administrators additional control over how they manage their users and groups. This was implemented through workflow provisioning profiles that allowed the admin/admins to assign user groups to different admins, based on select criteria. This adds convenience for the system admins to distribute the load of managing the users amongst themselves. Evidence & Recommendation: Duo Security already has the feature of organizing users into groups. This is a very nifty and useful administrative feature if used correctly. But a nice addition to it would be this sort of workflow provisioning, because currently, it doesn't appear that there is any way to manage the type/level of user who is enrolling into the system. Workflow provisioning helps tackle this problem in the following way - The admin can set rules such as if someone is registering from a particular profile, domain or IP pool, they will be directed to a specific admin for approval, who has more direct knowledge of these people and would be able to make a more informed call about whether these people should be accepted and if their information is correct. Thus, by adding this type of a feature, Duo Security s administrative solution will be more robust and will also allow admins fine grained control over their integration. Finding #3 We found that some of the competitors offered videos and forums to walk users through the process of setting up the serve on their respective systems. While products such as SecureAuth and Authentify provide video guidelines along with screenshots to help users, Cloudseal maintains an online forum where users doubts may be addressed by experts in the field. Duo on the other hand lacks any guidance in terms of a video tutorial or forum. While the documentation provided by Duo Security is pretty detailed and exhaustive, it would help to offer more guidance. Evidence & Recommendation: Our comparative analysis of Duo with the eight competitors stated above clearly state how Duo Security lacks the inclusion of video tutorials. This, supplemented with feedback from users who participated in the survey as well as our own experience in setting up the various products on our computers, lead us to believe that including videos and online forums would definitely be very helpful. While Duo has some nicely documented guides that pretty much focus on all aspects of the product, we must take into account, that not all users are very technically advanced. Video tutorials are an excellent way of providing guidance to such users. Having analyzed other products like SecureAuth, which does a great job at providing this form of guidance, we believe that Duo Security can better enhance the administrator s experience if this feature is added.
8 Members of a population vary on how they like to process information and learn new methods. By providing another channel of learning the features of the product and how to use it can help make Duo Security accessible and approachable to even more people. Finding #4 Multiple competitors provided individual demos for each of their products in addition to free trials. Evidence & Recommendation: A demo differs from a free trial as it provides a existing structure for the user to test a particular aspect of the product;; for example, Authentify provides users with a preset fictional corporation s online web portal which allows users to test the mobile application. RSA & PhoneFactor also provide demos that help users visualize how the product works without having to go through a registration process. Duo Security s easily accessible free trial, which can sometimes be set up and ready to test in as little as half an hour, already sets it apart from the majority of its competitors, most of whom require an interested user to first provide details and then wait for contact from a company representative to continue along the evaluation the process. In addition to the free trial, Duo Security should look into providing demos that allow users to quickly experience Duo s solution. More specifically, the benefit of providing these demos would allow administrators to eschew the overhead of getting the service set up in the first place. While going through registration and integration into the system can take 30 minutes or longer, a demo allows the user to try the product in 5 minutes. Duo Security s current user experience is top-notch with fantastic aesthetics - we believe that providing a demo would be a great way to allow a potential user to appreciate and understand this quickly, thus increasing the likelihood that they go through and try the more detailed trial. Finding #5 ipad and tablet apps for authentication are offered by several other competitors - Duo Security does not. Evidence & Recommendation: In the survey that we conducted prior to this analysis, we asked users for suggestions on how to improve the product, and several mentioned that Duo Security should explore a tablet application in addition to the mobile applications currently provided. In doing our comparative analysis, we noticed that several of Duo s competitors, specifically PhoneFactor(extended edition), Authentify, Symantec, Entrust, Google, and RSA all have tablet support. Increasingly, tablets are becoming on par with smart phones in terms of being trusted devices for users, and so introducing a tablet application for both ipad and Android would be a value addition to Duo Security s mobile offerings. From Duo Security s website and documentation, it appears that there is no tablet application offering, or if there is, this is not mentioned anywhere:
9 Figure 1. Duo Mobile's documentation reveals no tablet applications So, based on our survey results and our comparative analysis, we recommend Duo Security develops a tablet application through which users can utilize the Duo Push functionality. While a tablet application would not be able to provide SMS and voice-calling alternatives, users that want to use a tablet would be aware of this limitation but may prefer using a tablet regardless. Finding #6 Duo Security s website was better organized with a comparatively better set of visual aesthetics than all other services encountered. Evidence & Recommendation: While the measure of aesthetics is completely subjective, feedback from our survey convinced us to include aesthetics as a measure with which to compare these different products. Several survey respondents, when asked why they switched to Duo Security, took the time to mention in the other option that they found Duo Security s cool factor appealing. Our analysis corroborates these sentiments. The amount of time it took to understand and navigate Duo s website was much shorter than all of the identified competitors. Additionally, important information was organized in an easy to find and accessible way. This was not the case on most other competitors sites, where a significant amount of effort and searching was required to develop a basic profile of what was being offered. We believe that this gives Duo an added advantage over these other competitors, and we found it important to emphasize this positive. We believe that the addition of some of the prior recommendations, such as video tutorials and demos, can only help enhance this strength and make the site ven more appealing and inviting.
10 Discussion One of the main things we noticed when we were researching possible competitors was that only two of them had the same service profile. The others provided two factor authentication as a secondary service to add on to their existing security mechanism or as one of their authentication methods amongst many others. While these products still remain direct competitors to Duo Security (since they provide strong two factor authentication), it is important to note that they also offer other features. In our study, we suggested recommendations to Duo Security based on features that two or more other competitors have which could potentially benefit Duo. However, considering the nature of their business, it was not possible to obtain free trials for some of the competitors in time to evaluate them effectively. Therefore, we may have missed out on some other possible avenues of comparison. Duo does an excellent job at eliminating that step and allowing users to try things out themselves before/instead of involving them in a phone or discussion to explore possible options for them. Another thing we noticed was that most competitors targeted enterprise setups as potential target audience. While Duo does support those setups, they have tried to widen their user base by giving equal priority/visibility to simpler systems and integrations. We sought to incorporate this vision into our recommendations. Lastly, we discussed considering the method of integration of the selected products into the system as one factor of comparison. However, given the trouble we had in securing functioning trials with products, with which we could test integration, we determined not to go with this. Further, different systems will have different technical requirements for integration and different security measures required. While this was not within the expertise of our team to analyze, the integration into popular systems may be a next step that Duo Security might want to investigate in comparison with other products, to see if integration can be made easier and more streamlined. Conclusion An effective comparative analysis helps identify possible business competition and understand better where the client stands amongst other similar companies. Duo Security does a very good job with the signup process, initial setup and visual aesthetics. However, when compared to their competitors, we did find a few areas where their service could be improved upon. Our recommendations were to explore the possibility of a tablet based app, supplement the guides with video tutorials, better workflow provisioning and the ability to test integration demos before signing up for the trial account. Duo does a good job at highlighting the features that distinguish themselves from their competitors, but could do a better job at making the common features more conspicuous. These recommendations can thus be adapted to Duo Security's
11 existing model or act as avenues of focus for further improvements/research. Implementing these recommendations can help make the already excellent product that Duo Security offers even better.
12 References SecureAuth - Entrust PhoneFactor Authentify Symantec Google dual-authentication RSA Cloudseal -
13 Appendix The following spreadsheets show the profiles that we generated for each competitors based on our selected criteria of analyses. The first spreadsheet(2 pages) consists of profiles, the second spreadsheet shows which competitors have tablet applications(1 page), and the last shows if they have a demo(1 page).
14
15
16
17
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationMulti-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationSTRATEGY MARKETING. Target MANAGEMENT VISION. Effective app store marketing strategies for your mobile VoIP app
STRATEGY Target MARKETING MANAGEMENT VISION Effective app store marketing strategies for your mobile VoIP app 01 Effective app store marketing strategies for your mobile VoIP app These days it's not enough
More informationAll You Need to Know about KiwiSchools
All You Need to Know about KiwiSchools Table of Contents Welcome Your Investment with us Typical Website Timeframe The KiwiSchools Process - Building the perfect website for your school... Step 1: Discovering
More informationFacebook s Security Philosophy, and how Duo helps.
Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across
More informationUNILY FOR SHAREPOINT ONLINE
The World s Largest SharePoint Product and Resource Directory UNILY FOR SHAREPOINT ONLINE A superior 5 star product. SharePoint Online has never looked better Product Reviewed by Ron Charity January 2015
More information2012 European Cloud-Based Authentication Services New Product Innovation Award
2012 2012 European Cloud-Based Authentication Services New Product Innovation Award 2012 Frost & Sullivan 1 We Accelerate Growth New Product Innovation Award Cloud-Based Authentication Service Europe,
More informationDesktop Management for the Small Enterprise
Desktop Management for the Small Enterprise There are three key factors why desktop management for your small enterprise doesn't have to cost a fortune: time, money, and manpower. If you have less than
More informationThe 4 Mindsets of Mobile Product Design. Scott Plewes
The 4 Mindsets of Mobile Product Design Scott Plewes With the recent popularity of smart phones and tablets, software product managers are under pressure to create mobile versions of their products for
More informationSecond CRM Startup Pack
Second CRM Startup Pack An Introduction Making Businesses Profitable www.secondcrm.com /secondcrm CRM for Startups Early stage Startups only focus on the idea and product and customer development is usually
More informationhttp://ubiqmobile.com
Mobile Development Made Easy! http://ubiqmobile.com Ubiq Mobile Serves Businesses, Developers and Wireless Service Providers Businesses Be among the first to enter the mobile market! - Low development
More informationInside Electronic Signature APIs
Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider
More informationIntegration Guide. Duo Security Authentication
Integration Guide Duo Security Authentication Revised: 21 January 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration
More informationSecuring your Juniper SSL VPN with two-factor authentication.
Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring
More informationLotusLive Engage Integrated online social networking and collaboration tools so you can work smarter before, during and after your meeting.
LotusLive Engage Integrated online social networking and collaboration tools so you can work smarter before, during and after your meeting. Ray Chan IBM China/HK Limited 2006 IBM Corporation Agenda Smarter
More informationesarinformation Systems Simplifying your Technology Mobile Applications Development Profile
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and
More informationFileMaker: Complete Platform to Create, Deploy, and Manage Custom ipad and iphone Solutions for Business
WHITE PAPER FileMaker: Complete Platform to Create, Deploy, and Manage Custom ipad and iphone Solutions for Business Executive Summary Business units and departments are developing custom ipad and iphone
More informationZoho Projects. Social collaborative project management platform
Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its
More informationthe ultimate guide to email marketing for insurance agents
the ultimate guide to email marketing for insurance agents what s in here? Email marketing & content marketing...3-4 Email marketing best practices...5 Email campaigns for insurance agents...6 AgencyBloc
More informationChanges in IT and Your Business are in Inevitable. Are you Ready? THE RIGHTANSWERS UNIFIED KNOWLEDGE PLATFORM IS A UNIQUE COMBINATION OF SOFTWARE,
Right Answers RightAnswers Unified Knowledge Platform The #1 Knowledge Management Solution R Answe Changes in IT and Your Business are in Inevitable. Are you Ready? THE RIGHTANSWERS UNIFIED KNOWLEDGE PLATFORM
More informationCollaborative Open Market to Place Objects at your Service
Collaborative Open Market to Place Objects at your Service D6.2.1 Developer SDK First Version D6.2.2 Developer IDE First Version D6.3.1 Cross-platform GUI for end-user Fist Version Project Acronym Project
More informationCustomizing and Integrating
Customizing and Integrating Microsoft Dynamics CRM The Essential Guide 1 INTRODUCTION What s in this Guide Ease of Use and System Design: How easy is the system to use for your company s users? What are
More informationCitrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
More informationOnline Meetings and Video Collaboration
Online Meetings and Video Collaboration Skype http://www.skype.com The World s Most Popular Video Calling Software. If at least one person on the call has a Premium account, it is possible to arrange a
More informationCourtesy of: VREB Virtual Real Estate Brokerage
Courtesy of: VREB Virtual Real Estate Brokerage Why Go Mobile? In today s world almost every industry is becoming more mobile friendly because of the huge increase in tablet and smart phone usage. The
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationRemote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
More informationlinkedin s new company pages
1 a step-by-step guide to linkedin s new company pages How to Use LinkedIn Company Pages for Marketing A publication of 2 IS THIS BOOK RIGHT FOR ME? Not quite sure if this ebook is right for you? See the
More informationAre You Part of the. modernhomes.org
Are You Part of the Internet A study by the National Association of Realtors, Profile of Home Buyers and Sellers, recently pointed out that 80 percent of homebuyers begin their home search on the Internet,
More informationSearch Engine Optimization A Basic Idea & Its Uses
Search Engine Optimization A Basic Idea & Its Uses Copyright 2013 credencedigital.com 1 Introduction Today, people find Internet a very effective tool to search products services that are of interest and
More informationBusiness Startups - Advantages of Using Automation
CLOUD AUTOMATION How Cloud Automation Can Help You Scale Your IT Services TABLE OF CONTENTS Introduction 03 Business Benefits 07 Administrator Benefits 11 Technical Considerations 14 Conclusion 17 2 INTRODUCTION
More informationRRLC uses Google Apps for Nonprofits for. Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube
RRLC uses Google Apps for Nonprofits for Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube Is Google for Nonprofits right for my organization? First, determine
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationWindows Intune Walkthrough: Windows Phone 8 Management
Windows Intune Walkthrough: Windows Phone 8 Management This document will review all the necessary steps to setup and manage Windows Phone 8 using the Windows Intune service. Note: If you want to test
More informationSecurity in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
More informationThe approach Microsoft has taken with its Windows Phone 7 platform is
1 Developing an App for Windows Phone 7: An Overview In This Chapter Developing apps for Windows Phone 7 Taking care of your customers after the app is in their hands The approach Microsoft has taken with
More informationUsing GitHub for Rally Apps (Mac Version)
Using GitHub for Rally Apps (Mac Version) SOURCE DOCUMENT (must have a rallydev.com email address to access and edit) Introduction Rally has a working relationship with GitHub to enable customer collaboration
More informationBiba Datasheet. Biba is a mobile collaboration tool that provides:
Biba Datasheet WHAT IS BIBA? Biba is a mobile collaboration tool that provides: The biggest thing for us has been Biba AutoCall it makes a tremendous difference when the system takes care of when you join
More informationHow to Choose the Best Inbox Integration for Salesforce
How to Choose the Best Inbox Integration for Salesforce This guide is written for information technology specialists who are looking for ways to improve Salesforce productivity. Salesforce is one of the
More informationHiring without hassle
Hiring without hassle Workable is everything you need to hire, in one place. From posting your job ad to managing candidates, it saves time on admin and creates time for people. WORKABLE IN BRIEF POST
More informationAVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
More informationNETGEAR ReadyNAS Duo/NV+ v2 Reviewer s Guide
NETGEAR ReadyNAS Duo/NV+ v2 Reviewer s Guide T a b l e o f C o n t e n t s Contents...2 NETGEAR Contact Info...3 Product Category...3 Overview...3 What s New...3 ReadyDROP...3 Beyond Time Machine...5 Mobile
More informationOffice 365 Fall Updates FAQ: New Office 365 Plans for SMBs and more!
Office 365 Fall Updates FAQ: New Office 365 Plans for SMBs and more! Table of Contents Overview... 1 Overview of new Office 365 Business plans... 4 Implications for existing customers Open, Advisor, Direct...
More informationSpecial Edition for FastTrack Software
08/14 The magazine for professional system and networkadministration Special Edition for FastTrack Software Tested: FastTrack Automation Studio www.it-administrator.com TESTS I FastTrack Automation Studio
More informationWHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
More informationTwo Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
More informationFrequently Asked Questions Aerohive ID Manager
Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management
More informationSymantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
More informationBlackboard Pilot Report July 12, 2013
Blackboard Pilot Report July 12, 2013 Introduction DeSales will adopt Blackboard Learn 9.1 as its Learning Management System to replace ANGEL in AY 2013-14. All courses starting on or after August 19th,
More informationFirstEnergy, generating excellent service.
FirstEnergy, generating excellent service. Energy company optimizes websites, mobile websites, and apps with Adobe Experience Manager to improve customer interactions. With Adobe Experience Manager, our
More informationQuick Start Guide for OnTime Now
Quick Start Guide for OnTime Now Set up your OnTime Now Account... 2 What you see... 3 Create a Project... 4 Add a Work Item from the main grid... 4 Launch the Planning Board... 5 Add a Work Item from
More informationSECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationMade for MSPs by an MSP
Made for MSPs by an MSP features & Pricing Guide THE END OF STICKY NOTE SECURITY www.passportalmsp.com lower costs improve security increase sales A cloud-based identity and password management solution
More informationThe best sales presentation software for business
Everything you need to know about Presentia when researching presentation products Overview of the product Are you looking to improve your company s sales presentations and get away from boring PowerPoint?
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationFind, track, pipeline, and manage your highly-skilled talent.
Jobvite Engage: High Tech Find, track, pipeline, and manage your highly-skilled talent. As competition heats up for hard-to-find skills across the tech industry everything from precious engineering and
More informationEnterprise Solutions IT Services 4132 Heartleaf Ln Naperville, IL 60564
Who we are Ensar Solutions Inc. is a Microsoft focused IT Services company. Our business is built around an exclusive focus on Microsoft SharePoint, Dynamics CRM, AX, Social, Azure and Mobile solutions.
More informationHow to Choose the Best Inbox Integration for Salesforce
How to Choose the Best Inbox Integration for This guide is written for information technology specialists who are looking for ways to improve productivity. is one of the most innovative and fastest growing
More informationBigger Picture Telstra 2013 Sustainability Reporting Series. Customer experience
Bigger Picture Telstra 2013 Sustainability Reporting Series Customer experience PUTTING OUR CUSTOMERS AT THE CENTRE CONTENTS Highlights 03 Context 04 Customer service 05 Customer advocacy 05 Managing bill
More informationAssociations today face more challenges and demands than ever
Associations today face more challenges and demands than ever before to deliver real value to their membership base. Professional development and education are aspects of an association s mission that
More informationThe 5-Minute Guide to Customer Support
Tame the Email Monster Moving Customer Support from Email to a Help Desk to Boost Efficiency July 2011 Table of Contents Executive Summary... 3 The Global Inbox... 4 Does Email Scale As Your Business Grows?...
More informationipads in the Secondary Classroom
ipads in the Secondary Classroom Agenda SAMR Model ipad as a Teacher Tool Substitution with the ipad Augmentation with the ipad Modification with the ipad Redefinition with the ipad Sharing Student Work
More informationTerminology page. All available site plans can be seen here: http://www.adobe.com/products/business-catalyst/buyingguide-subscriptions.
Terminology page Partner Portal Centralized console designed to help you build and manage your design business. You can view your clients sites and create new sites with the click of a button. You can
More informationTARGETPROCESS HELP DESK PORTAL
TARGETPROCESS HELP DESK PORTAL v.2.17 User Guide This document describes TargetProcess Help Desk Portal functionality and provides information about TargetProcess Help Desk Portal usage. 1 HELP DESK PORTAL...2
More information/// FRICTIONLESS BUSINESS USING I.T. TO STREAMLINE OPERATIONS
WHITE PAPER /// FRICTIONLESS BUSINESS USING I.T. TO STREAMLINE OPERATIONS To move fast in today s market companies must work to remove areas of friction that slow their business down. A key element to
More informationCloud Apps to Improve Agency Efficiency
Cloud Apps to Improve Agency Efficiency CONTENTS Introduction: Cloud Apps What Can They Do for You?...3 Benefits of Using Cloud Apps...4 Apps for Your Daily Operations...6 Document Storage Apps...9 Apps
More informationThe Quick Guide to Partner
QUICK GUIDE Optimize Partner Recruitment & On-Boarding The Quick Guide to Partner Recruitment & On-Boarding #channelchoices The Relayware Quick Guide to Partner Recruitment & On-Boarding 2 INTRODUCTION
More informationFileMaker Business Alliance Program Guide
FileMaker Business Alliance Program Guide FileMaker Business Alliance Guide Together with our FBA partners, we strive to enhance every customer s journey, expand the FileMaker community and deliver outstanding
More informationChoosing an LMS FOR EMPLOYEE TRAINING
Choosing an LMS FOR EMPLOYEE TRAINING As organizations grow it becomes more challenging to scale your internal learning culture. You must be certain that your staff is trained in the entire organizational
More informationProfessional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services
Professional Development Training Course Catalog Fall 2013 ITS Offered by Furman University Information Technology Services in collaboration with Center for Teaching and Learning And the Library These
More informationDynamic Resource Management in Cloud Environment
Dynamic Resource Management in Cloud Environment Hitoshi Matsumoto Yutaka Ezaki Fujitsu has been providing ServerView Resource Orchestrator (ROR) since June 2010 as a software package for constructing
More informationAre Passwords Passé?
Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon
More informationCustomer Timeline - New in Summer 2012. Web Lead Capture - New in Summer 2012. Built-In Dashboards - New in Summer 2012
What s New Maximizer CRM 12 Features New Mobile Access User Interface Enhanced Mobile Access Appointment Management Enhanced Web Access User Interface Improved Web Access Speed & Navigation LinkedIn Integration
More informationMobile Apps: What Consumers Really Need and Want. A Global Study of Consumers Expectations and Experiences of Mobile Applications
Mobile Apps: What Consumers Really Need and Want A Global Study of Consumers Expectations and Experiences of Mobile Applications The Difference Between a Mobile App and a Mobile Website Before we evaluate
More informationCRM + AGENT ADOPTION = PRODUCTIVITY
CRM + AGENT ADOPTION = PRODUCTIVITY 1 INTRODUCTION The technology team at REAL Trends undoubtedly sees value in Customer Relationship Management (CRM) systems. Whether your company is big or small, independent
More informationAdobe Summit 2015 Lab 718: Managing Mobile Apps: A PhoneGap Enterprise Introduction for Marketers
Adobe Summit 2015 Lab 718: Managing Mobile Apps: A PhoneGap Enterprise Introduction for Marketers 1 INTRODUCTION GOAL OBJECTIVES MODULE 1 AEM & PHONEGAP ENTERPRISE INTRODUCTION LESSON 1- AEM BASICS OVERVIEW
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationHOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012
HOW TO SELECT A BACKUP SERVICE FOR CLOUD APPLICATION DATA JUNE 2012 INTRODUCTION The use of cloud application providers or Software-as-a-Service (SaaS) applications is growing rapidly. Many organizations
More informationCreating a DUO MFA Service in AWS
Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013
More informationHosted Workspaces Demo Guide for Citrix Service Provider Partners
Hosted Workspaces Demo Guide for Citrix Service Provider Partners Deliver a great hosted workspaces customer demo that includes Desktops-as-a-Service, virtual applications, file sharing and sync and Mobile
More informationSearch engine optimization and CRM features:
Everything you need to know about Bigcommerce Hosting Bigcommerce Why is it the best E-commerce Solution? E-commerce today is one of the biggest and most profitable industries on the internet. With such
More informationUsing Google Analytics
Using Google Analytics Overview Google Analytics is a free tracking application used to monitor visitors to your website in order to provide site designers with a fuller knowledge of their audience. At
More informationHow to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2
èè How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 Table of Contents 1. General overview... 3 1.1. Installing the plugin... 3 1.2. Testing the plugin with the
More informationProposal Document TitleDocument Version 1.0 TitleDocument
G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public
More informationBest Practices of Project Management and Tracking Tools
Best Practices of Project Management and Tracking Tools A solid Lean Six Sigma deployment requires a mechanism for recording, storing, viewing, and reporting on the on going project work. This level of
More informationUsing Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox
(Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine
More informationMulti-Factor Authentication for first time users
Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor
More informationTables in the Cloud. By Larry Ng
Tables in the Cloud By Larry Ng The Idea There has been much discussion about Big Data and the associated intricacies of how it can be mined, organized, stored, analyzed and visualized with the latest
More informationContent Marketing in 2014:
Benchmark Report Content Marketing in 2014: Sponsored By: 2014 Demand Metric Research Corporation in Partnership with Ascend2. All Rights Reserved. TABLE OF CONTENTS 3 Executive Summary 10 Content Campaign
More informationWHITE PAPER MULTI-CHANNEL CAMPAIGNS IN A CONNECTED WORLD. Create and deploy IT solutions for business
WHITE PAPER MULTI-CHANNEL CAMPAIGNS IN A CONNECTED WORLD White paper - Multi-Channel Campaigns in a Connected World - Prodware 1 Create and deploy IT solutions for business Navigating Multi-channel Marketing
More informationCalifornia Mobile Gallery
California Mobile Gallery NASCIO Category: Government to Citizen Carlos Ramos, State Chief Information Officer California Department of Technology Project Initiation: January 2014 Project Completion: August
More informationUtilise one central repository for a diverse range of content EQUELLA. www.equella.com
Utilise one central repository for a diverse range of content EQUELLA C O N T E N T P L A T F O R M www.equella.com What is EQUELLA? EQUELLA, our web-based platform provides one central location for the
More informationGet Your Business Moving. In partnership with Nomis Connections
Get Your Business Moving In partnership with Nomis Connections Get Your Business Moving Mobile devices + the cloud = biggest business opportunity to come along in quite a while Businesses have more opportunity
More informationMARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan.
MARKETING KUNG FU: 25 Things Every Marketing Department Needs Use this checklist as a guide or as a starting point for your complete marketing plan. 1 Your Business Plan How big is your market opportunity?
More information5 Quick Tips For Small Business Entrepreneurs In 2015
Quick Tips for Small Business Entrepreneurs In 2015 Advice you can t afford to miss! 1 Table of Contents 1. Introduction 3 2015 The Year of Customer Experience 2. Tips for Marketing Your Product Better:
More informationZoho Recruit. Recruitment and applicant tracking software
Zoho Recruit is an all- in- one recruitment and applicant tracking system that caters to the needs of both recruiting agencies and in- house corporate recruiters by simplifying the entire hiring process,
More information