identify

Results 1 - 25 of 996Sort Results By: Published Date | Title | Company Name
Published By: Kazoo     Published Date: Oct 11, 2019
Are you ready for a new Recognition & Rewards Platform? Recognition and rewards are an integral part of your companys employee experience and engagement levels. To determine whether an HR technology provider is the right fit for your organization, we recommend asking questions that address the various components of recognition and rewards, as well as background on the providers company and technology. Download our buyers guide for the five major areas you'll need to cover before making a purchase, including: The business value and ROI of recognition & rewards Identifying your need and specific goals for an employee experience program Key questions to ask engagement platform vendors A decision checklist and a detailed comparison sheet Two budgeting exercises to justify your investment
Tags : 
    
Kazoo
Published By: SiteImprove     Published Date: Oct 02, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove
Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: why I4.0 transformation demands a cross-functional approach how to get planning for I4.0 transformation the right way round how to identify the best opportunities to create value critical enablers for I4.0 transformation five questions to ask for smarter I4.0.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Develop practical strategies for success and manage the risks associated with supply chain transformation. Read this insight to find out about: the digital solutions companies are using to reshape their supply chains the benefits they realise as a result how to identify opportunities for optimisation in your own supply chain which practical strategies to deploy for successful digital transformation.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones. Don't get frustrated. Cisco Umbrella can help, and you can be up and running before your next coffee break. Check out our simple security checklist to learn how to identify red flags and put an end to empty security promises. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go beyond the hype.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: PwC     Published Date: Sep 18, 2019
The traditional payer business model is fast becoming obsolete. Blues organizations that cling to the status quo or business as usual risk jeopardizing their reputations and business, because people are more than patients. Increasingly, employers are driving the growing demand for more solutions to engage customers. In response, healthcare incumbents and new entrants are building solutions to address rising costs and meet consumers demands for personalization, price transparency, access, and seamless, simple experiences. Proactive engagement can help your members lead healthier lives while improving outcomes for payers and other players. With 5% of Americans consuming 50% of healthcare costs, identifying and engaging high-risk, high-cost customer segments is essential to sustainability.
Tags : 
    
PwC
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q4'19
Published By: Avetta     Published Date: Sep 17, 2019
11 ways to identify the best supplier verification partner for your organization. Third-party supplier qualification vendors typically offer a combination of technology and service but they are not all created equal. This guide will help you compare the features to look for in a technology platform, the kinds of services provided, and how to evaluate a third-party supplier qualification partner to meet your needs. It is most suited to safety, procurement, compliance, risk management, operations, and other professionals evaluating a third-party vendor to help manage their supplier qualification program.
Tags : 
    
Avetta
Published By: Oracle     Published Date: Oct 01, 2019
Ever wished you could identify talent thats likely to leave, so you could act quickly and ensure it stays? By gleaning insights from data, you could know in advance what needs to be done to keep your star hires engaged. Our new video tutorial shows how managing data at scale and speed enables you to increase employee satisfaction, reduce turnover and control recruitment costs. Explore how you can keep hold of your talent in this new video tutorial.
Tags : 
    
Oracle
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Retailers who can identify their customers and deliver hyperpersonalized engagement on any channel are the ones thriving in this new age of retail. As the old model of inventory-led retail becomes obsolete, forward-thinking marketers deliver a new generation of shopping experiences with a common focus: the individual consumer. In our Personalization Handbook for Retail Marketers, well provide a toolset of proven strategies and technologies to help marketers leverage personalization for longterm wins such as increased customer loyalty, spending frequency and lifetime value. Starting things off, well discuss why hyper-personalization is the only constant in todays rapidly changing retail landscape.
Tags : 
    
Selligent Marketing Cloud
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBIs Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brands website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
Published By: Genesys     Published Date: Jun 27, 2019
Key considerations for navigating a successful migration journey
Tags : 
    
Genesys
Published By: PatSnap     Published Date: Sep 27, 2019
Out-of-box tools that use AI, machine-learning, and real-time intelligence are driving the commercialization of IP today. However, IP professionals are faced with a dizzying array of offerings on the market. What features are must haves for IP teams in 2019? What processes will streamline the commercialization process? This eBook works as a clear guide in identifying the tools IP teams need to commercialize with confidence, in 4 easy-to-action workflow tips: 1. Confirming patent novelty easily 2. Deciding on ideas that are worth pursuing 3. Collating key data via analysis and patent landscaping faster 4. Mitigating bottlenecks through interdepartmental collaboration
Tags : 
research and development, intellectual property, innovation
    
PatSnap
Published By: Adobe     Published Date: Sep 23, 2019
Like the oxygen we breathe, journey analytics brings life to the customer behind those devices, over time getting to know their favorite pastry choice, when theyre most likely to buy gas, and how long they stay online while in the stations caf. WHY SHOULD THE TARGET AUDIENCE CARE? Business struggle to gain a holistic customer view the skills to identify actionable insights from multichannel data are in short supply. If they could gain a holistic view of customer attributes and behaviors, they could make sure they get the right content at the right time. SUPPORTING CONCEPTS If you want your customers to enjoy seamless, personalized experiences, you need to treat them like people. That means marketing to the person not the device. When you know a customers interests, wants, and needs perhaps even before they do youve succeeded at becoming a true experience business. For some, this may require a shift from analytics as a tool to analytics as a way of life. It may also m
Tags : 
    
Adobe
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
    
Nuance Communications
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
    
Nuance Communications
Published By: Nuance Communications     Published Date: May 28, 2010
Register today to view to the webcast Proactive Notifications for Financial Services: Using Automated Customer Communications to Manage Risk and Retain Customers.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, financial services
    
Nuance Communications
Published By: ExpertVoice     Published Date: Sep 25, 2019
Mammut makes highperformance climbing and outdoor equipment for the toughest adventures. Understanding the value of expert recommendations, Mammut partnered with ExpertVoice to identify brand sentiment and increase the likelihood that qualified professionals who influence their targeted consumers like REI employees and members of the American Alpine Club recommend their products.
Tags : 
    
ExpertVoice
Published By: Marketo     Published Date: Sep 03, 2019
Need a more significant ROI from your campaigns? Shift your thinking towards acquiring, retaining, and growing high-value accounts: companies or consumers that are high-yield and a better fit for your products or services. New channels, strategies, & technologies now help organizations of all sizes to implement an account-based marketing (ABM) strategy. Download Marketo's best-in-class Definitive Guide to Account-based Marketing and you'll learn: How to identify, prioritize, and profile the right accounts Creating a winning ABM strategy Creating the right content Which channels to leverage and how to coordinate them How to measure, analyse & optimize ABM campaigns What an ABM strategy that spans the entire customer lifecycle looks like in action
Tags : 
    
Marketo
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Impervas WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Impervas sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web servers IP
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousnessand scopeof the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Impervas SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.