behavior

Results 601 - 625 of 650Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Evergage, Inc.     Published Date: Apr 17, 2014
In this video, learn how Real-time web personalization can track and respond to user behavior in real-time, throughout the entire customer life cycle, to increase conversion rates and drive customer success.
Tags : evergage, marketing, marketing technology, online marketing, customer behavior, customer insights, intent, real time, real time personalization, conversion rate, customer life cycle, customer engagement
     Evergage, Inc.
By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
     Castlight Health
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
     AlienVault
By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment, asset management, breach prevention
     AlienVault
By: Oracle     Published Date: Sep 05, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World"
Tags : digital, body language, sales, responses, transactions, b2b, body language, downloads, engagement, business, climate, product, solution
     Oracle
By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
     AdRoll
By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : protection, prevention, malware, security, cyber attacks, information
     Microsoft Office 365
By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
     Akamai Technologies
By: Salesforce Commerce Cloud     Published Date: Jul 11, 2016
The retail business is changing. Fast. Consumers are adapting to new technologies and financial constraints. As a result, retailers have to be adaptive, agile and nimble. This free whitepaper from Demandware looks at tomorrow’s retail environment, what it means to be ready for the future, and some tools to help assess your readiness.
Tags : demandware, retail, future ready, retail environment, growth, customer experience, consumer behavior
     Salesforce Commerce Cloud
By: IBM     Published Date: Jul 19, 2016
This interactive demo demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics, enterprise applications
     IBM
By: IBM     Published Date: Jul 21, 2016
Watch this webinar and learn how you can: - Hire for leadership behaviors - Identify high potential leaders in your organization - Develop your leadership pipeline
Tags : ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
     IBM
By: Curalate     Published Date: Jan 09, 2017
Tips and ideas for fashion and beauty retailers to influence millennial shopping behaviors across key digital channels. Download now!
Tags : digital channels, fashion, beauty, visual content, millennial outreach
     Curalate
By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
     AWS
By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : cloud security, client data protection, data encryption, cloud, user behavior
     Citrix ShareFile
By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
     IBM
By: Lookout     Published Date: Mar 30, 2018
Is your sensitive government data in danger due to a vulnerable mobile workforce? Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts your agency at risk. Read the report for the surprising findings.
Tags : 
     Lookout
By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
     Progress
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
     CrowdStrike
By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
     Q2 eBanking
By: Q2 eBanking     Published Date: Jul 30, 2017
Many financial institutions see their customer data as one of their most valuable assets. Unlocking insights from that data helps FIs understand, anticipate and offer account holders the products and services they truly need. A major trend to unlocking customer insights is using machine learning to surface the behavioral intelligence buried in the large amount of account holder transactional data captured each and every day. In this paper, learn how a group of talented, enthusiastic analysts with an open approach to data can yield some very interesting and extremely valuable and actionable results. This approach, championed by Q2 Executive Vice President and CTO Adam Anderson, has led to a new platform, Q2 SMART, which provides powerful behavioral analytics for financial institutions, enabling growth while providing account holders with real value.
Tags : 
     Q2 eBanking
By: Adobe     Published Date: Sep 21, 2017
"Email has proven itself as a revenue-driving workhorse of any marketing strategy. And yet, two-thirds of marketers are still less than satisfied with their email marketing efforts. We joined forces with Email on Acid to shed a light on the most effective email campaigns. Read The Art of the Click to learn helpful email insights, like: --The four critical qualities of all great email experiences --Subscriber open and read behaviors throughout the day --Why all clicks aren’t created equal"
Tags : 
     Adobe
By: Moxie     Published Date: Oct 18, 2018
Achieve your campaign performance goals by successfully mapping campaigns to the right engagement opportunities. With ever changing customer expectations and behaviors in the new Guided Economy, engage your customers throughout their online journey. By mapping campaigns to customer engagements, digital channels are used to help guide customers to conversion through a campaign centered approach.
Tags : customer engagement, engagement, planner, digital, templates, campaigns, marketing, digital, digital marketing, conversion, ecommerce
     Moxie
By: Forcepoint     Published Date: Oct 02, 2019
Would you like a live demonstration of the Forcepoint product portfolio, tailored to your security questions and requirements? Our representatives can show you the capabilities of the most appropriate product(s) for your situation, answer your questions and provide additional material to support your research. If you would like a live demonstration, please fill in the form opposite and one of our representatives will contact you shortly to discuss your requirement.
Tags : 
     Forcepoint
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com