Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

customer activity

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Don’t let a point of sale outage hurt sales and ruin the customer experience. Internet downtime can rack up thousands of dollars in lost revenue. A negative user experience can hurt your business and ultimately cause customers to move to a competitor. A business continuity solution can help provide additional bandwidth to handle peak activity and support temporary retail activity.
Tags : 
    
U.S. Cellular
Published By: Trustpilot     Published Date: Apr 30, 2018
Having reviews is essential, but it’s only the first step Today, the winners in business are not always the ones with the lowest prices or the biggest range of products. In fact, the winners are not even always the biggest brands. The winners are trusted companies who offer an exceptional customer experience again and again. Simply, the winners are those who are listening to their customers. We all know we need reviews on our website, we know visitors to our website want to see reviews to help them make their buying decision. But that is just the beginning. Recognize the full potential that reviews have and you’ll see an improvement in the performance of all your marketing activity.
Tags : 
marketing, ecommerce, conversion strategies, seo, customer reviews, user generated content
    
Trustpilot
Published By: F5 Networks Inc     Published Date: Jul 21, 2014
Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about the essential principles driving web application acceleration technologies today.
Tags : 
web app, acceleration, implementation, data, performance, it management
    
F5 Networks Inc
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
Customer service has evolved from a reactive activity viewed largely as a cost center-based tactical necessity, to a proactive management task that can in many ways set a company apart from the competition. At the same time, the channels by which customers receive support are growing and fragmenting very rapidly. The telephone is still the primary mode of support, but is steadily declining as text, social media, chat, knowledge bases, email and online communities provide new avenues for customers to get the help they need. Some organizations are embracing this evolution by implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals.
Tags : 
logmein, infoworld, customer service, customer support, support, support strategy, social media, mobile support, email support, remote pc access software, remote desktop connection, remote computer support, customer support channels
    
LogMeIn Rescue
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Find out how you can convert your pains into profit. Learn how Microsoft Customer Relationship Management (CRM) can help you develop profitable customer relationships. Microsoft CRM uses lead and opportunity management, incident management and a searchable knowledgebase. CRM also makes use of reporting tools for accurate forecasting, measurement of business activity, and employee performance.
Tags : 
sales, sales software, sales funnel, forecasting, analytics, business activity monitoring, microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Published By: Oco, Inc.     Published Date: Jun 24, 2008
As a Services Executive are you struggling with questions regarding what to measure, how to effectively engage with your customers, and what information should be leveraged and shared with service-chain partners and customers? Leading edge organizations are making tools and data available to their suppliers and customers with aggregated information from multiple data systems. Service-chain partners and customer personnel can now see the same views of service performance and activity. This is the next frontier to creating customer "stickiness" and business growth.
Tags : 
business analytics, oco, service management, analytical applications, dashboard, analytic, growth
    
Oco, Inc.
Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility
Published By: Webtrends     Published Date: May 12, 2010
Whether you're new to email retargeting or a certified segmentation genius, Webtrends Email Exchange makes it easy to send timely, relevant and targeted emails based on your customers' web activity.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators
    
Webtrends
Published By: Five9     Published Date: Aug 16, 2013
Six out of ten contact centers projected to have a cloud-based contact center deployed by the end of 2013. Why? Ultimately, because it will help them be more responsive to their customers, without the prohibitive costs of carrying enough premise-based technology to cover demand spikes. In this concise analysis of two recent contact center executive surveys, Aberdeen Group analysts discuss how cloud-based infrastructure enables contact centers to excel in key activities including center activity reporting, agent performance feedback and more.
Tags : 
cloud, roi, contact center, crm, solution, technology, premise-based, data center
    
Five9
Published By: IBM     Published Date: Aug 05, 2015
Banks have always benefited from customer information based on account activity and segmentation. With the advent of big data technologies, banks can understand their customers in greater depth and predict their needs by analyzing all available customer information.
Tags : 
digital banking, big data, ibm, customer information, account activity, segmentation, value proposition, customer behavior
    
IBM
Published By: SmartFocus     Published Date: May 27, 2015
Your customer wants a personalized and relevant experience, with every interaction, tailored around THEIR location, activity and device. Are you delivering that? In a recent webinar hosted by Forrester Research Inc and SmartFocus they discuss taking personalization to the next level with context-aware marketing - the emerging theme of 2015 that is changing the way we do marketing.
Tags : 
forrester, mobile, marketing, personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns.
    
SmartFocus
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity, loyalty
    
Informatica
Published By: eROI     Published Date: Jan 23, 2007
Your customers are the most important aspect in your business - without them, you have nothing. eROI offers communication advice that can help you to maximize customer satisfaction and loyalty. Topics discussed include loyalty offers, low activity offers, surveys, and more.
Tags : 
lead generation, email marketing, newsletter design, loyalty and retention, content personalization, re-engagement, re-enticement, low activity
    
eROI
Published By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesn’t even get to your customer’s inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers who’ve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
    
eDataSource
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.