behavior

Results 576 - 600 of 620Sort Results By: Published Date | Title | Company Name
By: Dell Software     Published Date: Apr 17, 2013
Learn more about User Experience Monitoring and the need for advanced real-time predictive analytics to capture information and identify trends. Download this paper today and discover vital recommendations, including the need for better dialogue between IT and business and knowledge of end-user customer behavior.
Tags : user experience management, business impact, cornerstone, it transformation, end-user customer behavior, dell
     Dell Software
By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : foglight, user experience, user experience management, cast studies, dell, quest software
     Dell Software
By: Eloqua     Published Date: Nov 20, 2013
Reading and responding to your prospects’ digital buying behavior
Tags : oracle, eloqua, digital buying behavior, b2b, b2b transaction, marketing integration
     Eloqua
By: IBM     Published Date: Aug 06, 2014
Customer Profitability Analytics enables banks to analyze customer, account, product, and transaction data and apply costing models to determine a bank-wide view of profitability. Applying predictive analytics, they can model future behavior and derive a lifetime value for each customer.
Tags : ibm, banking, customer, profit, analytics, costing models
     IBM
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Evergage, Inc.     Published Date: Apr 17, 2014
In this video, learn how Real-time web personalization can track and respond to user behavior in real-time, throughout the entire customer life cycle, to increase conversion rates and drive customer success.
Tags : evergage, marketing, marketing technology, online marketing, customer behavior, customer insights, intent, real time, real time personalization, conversion rate, customer life cycle, customer engagement
     Evergage, Inc.
By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
     Castlight Health
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
     AlienVault
By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment, asset management, breach prevention
     AlienVault
By: Oracle     Published Date: Sep 05, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World"
Tags : digital, body language, sales, responses, transactions, b2b, body language, downloads, engagement, business, climate, product, solution
     Oracle
By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
     AdRoll
By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : protection, prevention, malware, security, cyber attacks, information
     Microsoft Office 365
By: Salesforce Commerce Cloud     Published Date: Jul 11, 2016
The retail business is changing. Fast. Consumers are adapting to new technologies and financial constraints. As a result, retailers have to be adaptive, agile and nimble. This free whitepaper from Demandware looks at tomorrow’s retail environment, what it means to be ready for the future, and some tools to help assess your readiness.
Tags : demandware, retail, future ready, retail environment, growth, customer experience, consumer behavior
     Salesforce Commerce Cloud
By: IBM     Published Date: Jul 19, 2016
This interactive demo demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics, enterprise applications
     IBM
By: IBM     Published Date: Jul 21, 2016
Watch this webinar and learn how you can: - Hire for leadership behaviors - Identify high potential leaders in your organization - Develop your leadership pipeline
Tags : ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
     IBM
By: Curalate     Published Date: Jan 09, 2017
Tips and ideas for fashion and beauty retailers to influence millennial shopping behaviors across key digital channels. Download now!
Tags : digital channels, fashion, beauty, visual content, millennial outreach
     Curalate
By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : cloud security, client data protection, data encryption, cloud, user behavior
     Citrix ShareFile
By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
     IBM
By: Lookout     Published Date: Mar 30, 2018
Is your sensitive government data in danger due to a vulnerable mobile workforce? Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts your agency at risk. Read the report for the surprising findings.
Tags : 
     Lookout
By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
     Progress
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
     CrowdStrike
By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
     Q2 eBanking
By: Q2 eBanking     Published Date: Jul 30, 2017
Many financial institutions see their customer data as one of their most valuable assets. Unlocking insights from that data helps FIs understand, anticipate and offer account holders the products and services they truly need. A major trend to unlocking customer insights is using machine learning to surface the behavioral intelligence buried in the large amount of account holder transactional data captured each and every day. In this paper, learn how a group of talented, enthusiastic analysts with an open approach to data can yield some very interesting and extremely valuable and actionable results. This approach, championed by Q2 Executive Vice President and CTO Adam Anderson, has led to a new platform, Q2 SMART, which provides powerful behavioral analytics for financial institutions, enabling growth while providing account holders with real value.
Tags : 
     Q2 eBanking
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com