Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

verification technology

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
Published By: Avetta     Published Date: Sep 17, 2019
11 ways to identify the best supplier verification partner for your organization. Third-party supplier qualification vendors typically offer a combination of technology and service – but they are not all created equal. This guide will help you compare the features to look for in a technology platform, the kinds of services provided, and how to evaluate a third-party supplier qualification partner to meet your needs. It is most suited to safety, procurement, compliance, risk management, operations, and other professionals evaluating a third-party vendor to help manage their supplier qualification program.
Tags : 
    
Avetta
Published By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology, security
    
ThreatMetrix.
Published By: StrikeIron     Published Date: Oct 03, 2013
Learn how email verification technology helped to minimize Party City's hard bounces at point-of-sale by allowing data to be cleansed and verified in real time, which greatly reduced the amount of human error.
Tags : 
strikeiron, data quality, party city case study, pos, pos system, point-of-sale, email verification technology, email verification
    
StrikeIron
Published By: StrikeIron     Published Date: Oct 03, 2013
Learn the best practices from StrikeIron's Email Verification Plus Hygiene technology and how this cloud-based & powerful technology goes through a four-step process to validate emails in real time.
Tags : 
email campaign performance, improve sender reputation, email verification, strikeiron, email verification plus hygiene, cloud, technology, emails, email verification, scrubbing
    
StrikeIron
Published By: StrikeIron     Published Date: Oct 03, 2013
Learn how email verification technology helped to minimize Magento's hard bounces at point-of-sale by allowing data to be cleansed and verified in real time, which increased their email deliverability rates by 25%.
Tags : 
magento, email deliverability, sender reputation, email verification, email verification technology, technology, point-of-sale, data, strikeiron
    
StrikeIron
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.