behavior

Results 201 - 225 of 613Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 31, 2015
In its "Restoring Connections" paper based on research of telecommunications firms, IBM ‘s top ranked Institute for Business Value identified actions CSPs can take to reset customer experience and build brand loyalty through innovative, compelling, personalized services based on deep customer insight. Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : 
ibm, telco, customer analytics, csps, consumer behavior, brand loyalty, personalized engagement, big data
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Oracle     Published Date: Feb 28, 2012
This study asked more than 6,500 consumers across the U.K., Spain, Germany, France, and Benelux about their satisfaction, likes and dislikes, common frustrations, and spending habits related to online shopping. Find out what was discovered!
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service, software-as-a-service, pms, product management
    
Oracle
Published By: Spredfast, Inc.     Published Date: Apr 04, 2014
Learn how to properly evaluate your Social Relationship Platform and see if there is something that you could be doing better to increase your social media presence.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
Learn how to properly evaluate your Social Relationship Platform and see if there is something that you could be doing better to increase your social media presence.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Apr 04, 2014
Learn the importance of creating a social media presence for your brand and see how you can leverage your networks in order to properly identify your specific audience in order to target their wants and needs.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
Learn the importance of creating a social media presence for your brand and see how you can leverage your networks in order to properly identify your specific audience in order to target their wants and needs.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Dell     Published Date: Aug 08, 2018
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. In July 2017, Dell commissioned Forrester to conduct a study of the 21st century workforce and how their new habits, attitudes, and workstyles are reshaping the world of work. With more personas in a single organization to cater to, businesses are failing to deliver against workforce demands. To get their tasks done, workers are circumventing security policies to get what they want, in their moment of need. Organizations have to understand the different behaviors across
Tags : 
    
Dell
Published By: Dassault Systèmes     Published Date: May 09, 2018
Discerning and demanding consumers expect meaningful retail interactions. Creating new world-class experiences is vital to differentiate products and boost profits in the consumer goods market. • Let me shop when and how I want: Technology to research and buy products defines consumer behavior, driven by social media’s “see now, buy now” mentality. • Give me relevant data: With ever-expanding information, every touchpoint should have customer data that matters. • Give me a truly unique experience: Innovative retailers use new partners and tools to deliver personalized consumer experiences. • Pair my products with consistently good service: New customer service technologies are crucial in a world with more consumer/retailer choices. • Make my retail environments better: Consumers want memorable, differentiated experiences in user-friendly digital and physical retail environments. I invite you to download your targeted industry analysis and uncover the expectations to take into account a
Tags : 
    
Dassault Systèmes
Published By: Virgin Pulse     Published Date: Jun 02, 2017
This report includes analysis from behavior and data scientists to help you understand why your employees may not be working at optimal levels and discover ways to address this growing problem.
Tags : 
presenteeism, employee presenteeism, workforce presenteeism, job presenteeism, presenteeism in the workplace, worker productivity, workforce productivity
    
Virgin Pulse
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security, business technology
    
Webroot
Published By: Lookout     Published Date: Mar 30, 2018
Is your sensitive government data in danger due to a vulnerable mobile workforce? Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts your agency at risk. Read the report for the surprising findings.
Tags : 
    
Lookout
Published By: Tyco Integrated Security     Published Date: May 05, 2015
This white paper outlines the behaviors to recognize and the proactive security measures you can take to protect your employees and customers.
Tags : 
workplace violence, crime, assault, protection, security equipment, knowledge management
    
Tyco Integrated Security
Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
This document will explain the behavior and benefit of implementing Diskeeper defragmentation software with intricate modern hardware technologies such as RAID, NAS and SANs. SANs, NAS devices, corporate servers, and even high end workstations and multimedia-centric desktops characteristically implement multiple physical disk drives in some form of fault tolerant disk striping (RAID).
Tags : 
san, sans, storage, raid, network attached storage, nas, storage management, defrag, defragment, defragmentation, fault tolerance, diskeeper, diskkeeper, disk keeper
    
Diskeeper Corporation
Published By: MaritzCX     Published Date: Nov 29, 2016
Learn and recognize the five signs that your financial customer is becoming a customer prospect. This paper will teach you the characteristics of customer prospects, how to win back and identify at-risk customers, identify patterns and predictive behaviors, and how to use your CX data to help you retain your customers.
Tags : 
maritzcx, cx strategies, customer experience, financial services, customer prospect
    
MaritzCX
Published By: BetterUp     Published Date: Mar 06, 2019
Research suggests that up to half of the investment your organization is making in Learning & Development (L&D) is being wasted. Employees unfortunately lose up to 75% of the information they receive through traditional L&D approaches (including learning management systems, episodic trainings, and workshops) — an effect known as the training transfer problem. In this report, discover the five critical requirements for effective behavior change and leadership development.
Tags : 
    
BetterUp
Published By: SAS     Published Date: Nov 04, 2015
How does marketing compare to a game of pool? Sometimes you hit a good shot – 9 ball corner pocket – like when you’ve marketed a product and your customer purchases it. But sometimes your shot misses, and you knock in your opponent’s ball. You could even knock your ball into the pocket, but mistakenly knock your opponent’s ball into a different pocket at the same time. Of course, you can’t predict everything in a game of pool – or in marketing. A campaign may reveal a weakness that sends customers scuttling to a competitor. A new product can cannibalize an existing product line. Customers could leave one of your legacy product lines to consume one of your newly launched products – perhaps causing you to lose some revenue. But unlike pool, it’s hard to observe and measure with the naked eye what’s happening in marketing. The way to improve your chances of success is to build a solid measurement plan that lets you define and measure diagnostic metrics.
Tags : 
sas, marketing analytics, data driven decision making, consumer behavior, marketing mix, networking, data management, business technology, data center
    
SAS
Published By: IBM Software     Published Date: Sep 13, 2011
Read this white paper to learn five practical steps your company can take to achieve customer intimacy: 1. Plan your goals, methodology and metrics; 2. Capture the right customer information, including structured and unstructured data; 3. Predict customer behaviors; 4. Act on these insights with relevant, timely offers to optimize the predicted outcome; and 4. Expand successes into other areas.
Tags : 
ibm, business performance, customer intimacy, technology, conversion rate, business analytics
    
IBM Software
Published By: Aprimo     Published Date: Mar 07, 2011
Using Behavior-Based Brand Interactions for True 1-to-1 Marketing.
Tags : 
aprimo, cmo, roi, measurement, b2b, b2c, digital media, marketing, customer satisfaction, expectations, conversion
    
Aprimo
Published By: Adobe     Published Date: Nov 07, 2013
Mobile platforms will act as a catalyst for the next generation of connected experiences. In particular, smart apps connected to products and CRM systems will emerge. In 2013, leading marketers will anticipate the longer-term mobile disruption and shift from tactical efforts to more transformative mobile strategies.
Tags : 
adobe, forrester, mobile trends, interactive marketing professionals, marketing control, mobile platforms, crm systems, transformative mobile strategies, consumer behavior, ubiquity drive, mobile mind shift, mobile momentum, scaled-up investments
    
Adobe
Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk
    
Iovation
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.