cards

Results 1 - 25 of 100Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jun 23, 2020
Consumers love instant everything, especially when it comes to making purchases. And with instant issuance, there’s no reason for your customers to wait more than three minutes to get their debit or credit cards. Whether it’s for new accounts, replacement of lost or expired cards, or reissuance after a security incident or breach, issuing cards instantly creates a positive customer experience that ONLY 23 PERCENT of banks are providing. Instead of waiting for cards in the mail, consumers get the payment products they want on demand — and the issuer becomes the hero.
Tags : 
    
Entrust Datacard
Published By: Epsilon     Published Date: Mar 17, 2020
To drive business performance and customer engagement, you need to have good identity resolution. But that hinges on getting identity right in the first place. We commissioned Forrester Consulting to evaluate how U.S. brands are doing at identity resolution strategies. Forrester found that at best only half of brands are capable of fundamental identity resolution capabilities, like finding customers across devices, controlling messaging frequency and building a unified customer profiles. The research assesses: how marketers are really using identity management today the gaps in their strategies recommendations to get on the right path
Tags : 
    
Epsilon
Published By: ADP     Published Date: Jun 10, 2020
xxx
Tags : 
    
ADP
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: Epicor     Published Date: Sep 20, 2017
Selecting the right enterprise resource planning (ERP) software often poses a challenge for many businesses in the manufacturing industry. With so many options out there, it’s difficult to break down each potential application and choose the one that’s the best fit for your business. This Gartner report explains how ERP selection teams can come to a consensus and establish an understanding of all options by jointly populating and prioritizing a hierarchical, weighted ERP evaluation model. A structured evaluation model helps put all the cards on the table by explaining and justifying to internal stakeholders, external auditors, and vendors how and why an ERP software decision was made. Read the Gartner report and establish your own ERP evaluation model to see if the Epicor ERP solution is the right fit for your manufacturing business.
Tags : 
    
Epicor
Published By: First Data     Published Date: Apr 25, 2013
Traditional direct mail campaigns often deliver anemic response rates and direct mail campaigns sweetened with discounts don’t fare much better. Poor results combined with escalating printing and mailing costs and changing consumer expectations means that businesses must find more effective ways to get consumers’ attention.
Tags : 
direct mail, gift cards, prepaid incentive, coupon, call to action, incentive cards, direct marketing, customer experience, lead generation, customer engagement, foot traffic, grand opening, customer data, consumer behavior, relationship marketing, loyalty program, direct response, mailing list, card activation, shopping patterns
    
First Data
Published By: Key Private Bank     Published Date: Apr 05, 2018
From budgeting daily expenses to deciding a career path, attending college brings plenty of opportunities for teenagers to make the right—and wrong—financial decisions. That’s why parents of college-bound children should utilize opportunities to instill money and wealth preservation lessons in their children. But knowing where to start can be daunting. The experts at Key Private Bank have narrowed down the best ways to help you discuss important money lessons with your teens, so that you can set your children up for a lifetime of financial success. Read about the four wealth lessons you can start introducing to your children now when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
financial responsibility, college money management, managing your money in college, college money tips, college spending tips, how can students spend money wisely, save money in college, budgeting in college, budgeting college students, personal finances for college students, credit cards and college, student loans, college loans, managing student loans, monthly budget for college students, savings accounts for students, spending habits of college students, better spending habits in college, money management for students, college cash management
    
Key Private Bank
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity
    
Prophix
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed® Cascade Shark provides continuous, high-speed packet capture to ensure that packet-level information is available when needed for granular, real-time and post-event forensic analysis. Based on high-performance 1GbE and 10GbE capture cards, Cascade Shark is capable of sustained line-rate, multi-gigabit per second recording of network traffic.
Tags : 
cascade shark, datasheet, riverbed, cascade, riverbed cascade, high-performance, sustained line-rate, network traffic
    
Riverbed
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A global chain of department stores has a robust brand that stands for luxury, legacy, and customer satisfaction. The retailer’s bedrock belief is in innovating to improve customer experience, both in-store and online. They strive to provide a friction-free shopping experience with secure login, hassle-free gift cards, and stored payment information. However, the retailer’s dedication to a friction-free shopping experience opened the doors to predatory automation attackers, resulting in five pain points for the company’s IT and loss departments. Download the case study to find out more.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A global chain of department stores has a robust brand that stands for luxury, legacy, and customer satisfaction. The retailer’s bedrock belief is in innovating to improve customer experience, both in-store and online. They strive to provide a friction-free shopping experience with secure login, hassle-free gift cards, and stored payment information. However, the retailer’s dedication to a friction-free shopping experience opened the doors to predatory automation attackers, resulting in five pain points for the company’s IT and loss departments. Download the case study to find out more.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Oracle     Published Date: Mar 16, 2018
What you will learn from this report: • The opportunity of loyalty: two thirds of consumers are already members of at least one restaurant loyalty program • What consumers look for in a restaurant loyalty program • What puts consumers off joining loyalty programs in the first place
Tags : 
mobile phone app, plastic swipe cards, restaurant loyalty program, oracle
    
Oracle
Published By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Rackspace     Published Date: Jan 29, 2020
Getting cloud migration projects over the line has become much harder due to the fact that signoff is now the domain of all or several functions of the business. From HR and sales to marketing and finance, there are many approvals to orchestrate. And that’s because IT strategy is now business strategy. IT impacts reach far and wide. Therefore, it’s imperative for a larger pool of business leaders to understand the technologies they adopt, which means the number of influencers and decision makers for IT projects has grown, too. Our assessment pack provides depth around the various questions you need to ask and steps to take, to place IT firmly on the front foot. Included are three assessment scorecards to help you understand how you rate in terms of preparedness for your cloud migration strategy across a range of stakeholders. See how you stack up with your current plans and identify areas where you could improve your strategy to align with their own thought process.
Tags : 
    
Rackspace
Published By: Equinix EMEA     Published Date: Mar 21, 2019
Globally, payments are going digital—whether they are cash moving to cards, QR codes at point of sale (POS), purchases moving from physical to online stores with electronic forms of payment, or payments becoming seamless with in-app experiences. This phenomenon is not new, but does appear to be accelerating. This increased speed of adoption is driven by multiple factors, including an abundance of new electronic payment methods—many of which are layered on top of existing payment methods— focused on convenience, speed and the overall consumer experience. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: Workday     Published Date: Aug 07, 2018
Rethink the way you plan, budget, and forecast. This webinar, hosted by Workday and featuring Paul Hamerman of Forrester Research, provides insight into the advantages of: Uniting organizational, workforce, and financial data Collaborating with stakeholders and planning participants Guiding the business with reporting, dashboards, and scorecards Watch the webinar replay to learn best practices for planning, budgeting, and forecasting that’ll help your organization succeed.
Tags : 
budget, forecast, forrester, best practices
    
Workday
Published By: Loop Commerce     Published Date: Mar 08, 2019
As retail continues its internet-influenced change and customer demand for “right now” service increases, a new area is open for business. There is no reason to send a shirt that is the wrong size or give an impersonal gift card. G-Commerce is here, offering a new type of personalized transaction and digitalized merchandise for those shopping for others. Learn how Loop Commerce's flagship product, GiftNow: • Increased % of sales from gifts by 2X • Drove 24% of Christmas Eve sales • Increased 6X demand over gift cards Retailers can grab last-minute shoppers literally up to the moment before a holiday, and increase profits through fewer merchandise returns.
Tags : 
    
Loop Commerce
Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend
Published By: Planview - Innotas     Published Date: Jun 06, 2017
This white paper details the five pillars of PPM and how they can set you up for future success. Because the last thing you want to do is watch your hard work crumble around you.
Tags : 
project portfolio management, ppm, roi, return on investment, infrastructure
    
Planview - Innotas
Published By: Gelato     Published Date: Jul 03, 2018
The creation, building, and protection of a brand is one of the highest priorities of a corporate marketing team. Your logo and company colors are printed around the world on business cards, thought leadership, signage, and for internal branding, among other things. Do you really know how many people are creating and printing materials on behalf of the company? Gelato CMO Christian Sæterhaug will shed light on the surprising discoveries our customers have made when investigating the issue. Watch the video to learn more.
Tags : 
    
Gelato
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.