behavior

Results 126 - 150 of 628Sort Results By: Published Date | Title | Company Name
Published By: Neustar     Published Date: Feb 27, 2013
Neustar® Information Services introduces you to the buying behaviors and patterns of today’s insurance customer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization
    
Neustar
Published By: Salesforce.com     Published Date: Oct 28, 2013
The ability to deliver exceptional customer experiences is proving to be a business differentiator – in fact, organizations that have a more mature customer experience strategy report between 10-20% greater impact on revenue generation outcomes than less mature businesses. This white paper reveals how your organization can better respond to changing consumer behaviors, needs, and expectations regarding customer experience and touch points.
Tags : 
custom service, contact center, supporting technology, customer service trends, best practices, business technology
    
Salesforce.com
Published By: Dell Software     Published Date: Oct 03, 2013
Download Beyond Web Analytics: Understanding the why behind the what of online customer behavior and see how Foglight User Experience Management can help your business better understand your customers’ online behavior and increase customer conversions.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion
    
Dell Software
Published By: Dell Software     Published Date: Oct 03, 2013
To see how UEM has turned into “the most effective transformer for better IT business alignment,” download User Experience Management and Business Impact – A Cornerstone for IT Transformation today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion
    
Dell Software
Published By: Dell Software     Published Date: Oct 03, 2013
Industry analysts EMS interview three users of Foglight from Dell to underscore the appeal of UEM, its essential value to IT, as well as Foglight versatility in supporting UEM’s multiple facets. Download How Foglight Makes User Experience Management a Reality: Three Case Studies today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion
    
Dell Software
Published By: blueconic     Published Date: Oct 14, 2014
Download this whitepaper to learn how your enterprise can leverage a powerful new technology to learn about each prospect from the first click on a website or ‘Like’ on a social media page.
Tags : 
blueconic, marketing, customer engagement, social media marketing, internet marketing, consumer behavior, market research, crm
    
blueconic
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management, business technology
    
Intralinks
Published By: SAP     Published Date: Nov 04, 2015
Download this whitepaper to discover how global companies are using innovative technologies such as beacons, dynamic pricing and adaptive analytics to flourish in the modern-day, next-generation retail world. Learn what they believe they’re doing well and where they’re struggling as they adapt to today’s rapidly evolving marketplace. These insights can help your business thrive in an increasingly disruptive retail landscape.
Tags : 
consumer behaviors, sap, dynamic pricing, beacons, adaptive analytics, marketplace, fulfillment, customer experience
    
SAP
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management, business technology
    
Intralinks
Published By: Ping Identity     Published Date: Feb 12, 2016
There’s been a fundamental shift in best practices over the last decade to accommodate new multiple-screen behaviors seen by 70% of Internet-connected consumers. The disconnected nature of a siloed channel-by-channel approach won’t provide the consistent end-to-end experience that today’s connected consumer demands.
Tags : 
    
Ping Identity
Published By: Anaplan     Published Date: Apr 06, 2016
Optimizing incentive compensation: aligning what you say with how you pay CSO Insights’ ICPM study* found that 69 percent of organizations use three or more metrics to build their sales compensation plans, but modeling and planning this sales strategy can quickly become too complex as a spreadsheet-driven exercise. It is crucial to get these incentive compensation structures right, because sales reps receive up to 60 percent of their income from incentive comp. In this white paper, we discuss the disconnect between sales behavior and incentive compensation structure and provide recommended steps towards optimizing your compensation plan.
Tags : 
sales performance management, compensation management, incentive compensation, sales planning, incentive comp, commission structure, sales performance, xactly
    
Anaplan
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
data security, accounting, cloud security, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care: How built-in data encryption keeps your PHI, DICOM studies safe Why more security pros are concerned with user behavior than cloud tools What your organization should know about the cloud and compliance
Tags : 
healthcare, data security, cloud software, privacy, patient care
    
Citrix ShareFile
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: PwC     Published Date: Jun 14, 2018
The positive impact of most cost-cutting efforts is short-lived, as individuals revert to past behaviors and spending habits. As normalcy returns, so can costs and head count. How do you keep the spirit alive? How do you make cost consciousness an organizational capability and a shared mind-set, rather than a bunch of rules that are resented and resisted? Look to the following strategic, operational, organizational, and cultural levers to help you sustain the change.
Tags : 
    
PwC
Published By: PwC     Published Date: Jun 20, 2018
Digital Fitness Assessment 2.0 is here. The time to upskill is now. Let’s face it--every industry is being disrupted. To stay profitable and lead the way, it’s critical to be deliberate about making sure your employees have the skills they’ll need to take you there. The Digital Fitness Assessment will help your employees build their future through a custom experience that targets specific skills and behaviors to each employee. Get a demo here. [Please confirm link works and is tracked] What if you could give every employee a blueprint for tomorrow's most-needed skills? Your people know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here. [Please confirm link works and is
Tags : 
    
PwC
Published By: Splunk     Published Date: Dec 11, 2018
Predictive IT is a powerful new approach that uses machine learning and artificial intelligence (AI) to predict incidents before they impact customers and end users. By using AI and predictive analytics, IT organizations are able to deliver seamless customer experiences that meet changing customer behavior and business demands. Discover the critical steps required to build your IT strategy, and learn how to harness predictive analytics to reduce operational inefficiencies and improve digital experiences. Download this executive brief from CIO to learn: 5 steps to an effective predictive IT strategy Where AI can help, and where it can’t How to drive revenue and exceptional customer experiences with predictive analytics
Tags : 
predictive it, predictive it tools, predictive analytics for it, big data and predictive analytics
    
Splunk
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing
    
Spredfast
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
Project management relies primarily on past performance to predict future results, however many companies still lack forward-looking capabilities to predict project outcomes and ensure success. Enhancing project management with PLM analytics offers the opportunity to switch from task-based activities to performance-driven ones to improve success rates. Use PLM Analytics to: • Gain actionable insight and valuable intelligence • Dramatically boost business value and improve project management performance • Reduce error-prone behavior like manual data collection • Leverage big-data capabilities and project intelligence Learn how to extend the value of your PLM investment and improve business performance for your company.
Tags : 
product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed
    
Dassault Systèmes
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
    
Sophos
Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
Published By: Limeade     Published Date: Feb 02, 2017
Stress is one of the top issues that affect our well-being. When money gets tight or relationships get frazzled, it can lead to unhealthy and unproductive behaviors. This tip cheat has five ways to combat the most common stresses we face.
Tags : 
    
Limeade
Published By: Teradata     Published Date: Jun 12, 2013
Health plans and insurers know that to thrive over the next 3-5 years, they must dramatically improve their ability to engage with individual consumers. The combination of Teradata products; an integrated data warehouse, Aster big data analytics and Aprimo integrated communication management, creates actionable analytic capabilities unparalleled in its ability to help companies achieve these goals. this white paper details how health plans and insurers can use Teradata to succeed in today’s healthcare environment.
Tags : 
healthcare, data, insights, health plans, integrated data
    
Teradata
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.