personal data

Results 1 - 25 of 232Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Here Technologies     Published Date: Jul 19, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
    
Here Technologies
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM
Published By: CrowdTwist     Published Date: Apr 16, 2018
In order for brands to compete and provide the level of personalization consumers have already come to expect, marketers need to work quickly to develop competencies around their abilities to collect contextual and anticipatory insight and meet customers in the moments that matter most to them. Now is the time for marketers to invest in technology that supports data capture, segmentation, predictive analytics, and machine learning. With these capabilities in place, brands should be on track to build rich first party profiles of customers across all channels and maximize customer lifetime value by creating relevant experiences at all stages of the customer lifecycle.
Tags : 
customers, predictive, branding, consumers, competition, lifecycle
    
CrowdTwist
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data, conversion, marketing roi, direct mail campaign, multi channel marketing, integrated marketing campaign, lead generation, campaign management, tracking and measurement, reports and analytics, marketing dashboard
    
Mindfire
Published By: SAP     Published Date: May 18, 2014
Big data and personal data are converging to shape the internet’s most surprising consumer products. they’ll predict your needs and store your memories—if you let them. Download this report to learn more.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault
Published By: SAS     Published Date: Jan 17, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape.
Tags : 
    
SAS
Published By: Oracle     Published Date: Feb 24, 2015
Data is the fuel of all marketing activities. Customers and prospective buyers are savvy, empowered, and carry high expectations for personalization across all interactions. Without the right data—at the right time—as well as the most effective strategies in place to manage our data sources, our communications and offers are dead on arrival. A one-size-fits-all approach to marketing is not a sound tactic—it’s a marketing fruitcake that no one wants to receive. It’s time to get down with data to delight your audience and provide them with the personal experiences they deserve. Read the marketing essentials guide now.
Tags : 
business technology, data center
    
Oracle
Published By: DataStax     Published Date: Mar 10, 2017
Today’s customers expect a seamless, intelligent and personalized experience that operates at the speed of the cloud and is continuously available regardless of location or platform. To deliver an optimal customer experience that will enable you to stay ahead of competitors you need a distributed, responsive and intelligent architecture which is only possible when the right database is in place. Read this eBook to learn how your database technology decisions can affect your ability to deliver either a transformational customer experience or a lackluster, dissatisfying encounter that benefits your competitors, not your bottom line.
Tags : 
    
DataStax
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Adobe     Published Date: Aug 30, 2017
Marketing leaders will find a host of new vendors in this year's Magic Quadrant for multichannel campaign management. Vendors are focused on integrating machine learning, personalization and ad tech capabilities into big data foundations for deeper customer engagement.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 27, 2018
Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
2017 Trends in Financial Services and Insurance: Customer is Priority The FSI sector is progressing with a digital, data-driven, marketing mentality, all centered around prioritizing customer experience and taking a more personal approach. The 2017 Digital Trends in Financial Services and Insurance compiles the information shared by over 800 FSI respondents to see what opportunities and obstacles are shaping the future of FSI. Read this report and find out: How data and personalization drive digital transformation How fintech is leading the FSI chase Tips to help future-proof your FSI business
Tags : 
    
Adobe
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Infor     Published Date: Jan 03, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : 
infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
    
Infor
Published By: Infor     Published Date: Jan 06, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : 
infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
    
Infor
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.