Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rules

Results 101 - 125 of 280Sort Results By: Published Date | Title | Company Name
Published By: FICO     Published Date: Nov 10, 2015
"Ever wonder how FICO Blaze Advisor moved a US Insurance Company from 100% manual to 99% automated underwriting? FICO Blaze Advisor decision rules management system created a central, standardized and user friendly system for ACG Michigan"
Tags : 
    
FICO
Published By: FICO     Published Date: Nov 10, 2015
ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions.
Tags : 
auto, insurance, underwriting
    
FICO
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security, wireless
    
IBM MaaS360
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
Read this report to understand how the age of the customer requires tech management to transform into a customer-facing function in speci?c ways. Business technology (BT) brings together technology and traditionally customer-facing roles like marketing, sales, service, brand/product management, and ful?llment for the purpose of deploying systems of engagement that provide di?erential customer experience. Firms must build these systems of engagement from the outside in, according to how customers move in market spaces. The rules for planning, building, and running systems of engagement are not the same as for previous generations of tech management because customers are not employees. The increasingly crucial role that digital technologies play in customer engagement elevates the CIO role in business — if CIOs can move beyond the traditional IT focus on technology assets and adopt an expanded view that centers on customer experience and choice
Tags : 
business technology, customer engagement, customer experience, cios, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: Symantec     Published Date: Oct 01, 2015
The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
e-commerce, ssl certificate, ssl golden rules, hidden dangers, website security, security
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: Pega     Published Date: Sep 11, 2015
Download thsi white paper to learn how financial institutions can implement full end-to-end compliance and risk management through Pega BPM: -Transforming compliance from burden to benefit -Ensuring KYC, Suitability and Affordability compliance -Managing and measuring complaints to resolution -Providing governance, control and transparency around new products -Agility to extend to new risks and regulatory requirements -One common platform with specialized rules by regulatory requirement, geography and risk type
Tags : 
    
Pega
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Want to appeal to financial executives? Dial up the logic. Financial executives differ from almost every other line of business (LOB) executive when it comes to decision-making, according to a new study conducted by the FORTUNE Knowledge Group in collaboration with gyro. While executives in most other industries are moving toward a more innate approach to decision-making, this group relies primarily on logic to guide their decisions. Understanding the differences between what financial executives look for in partnering with companies and what their peers value is key to developing messaging that appeals to this unique segment.
Tags : 
    
Tyco Integrated Security
Published By: WePow     Published Date: Sep 02, 2015
Even though you are job-matching expert, you still need rules to create an awesome candidate experience. Get candidates talking about how great your hiring process was with these simple rules.
Tags : 
video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips, candidate experience, employer branding, video interviewing
    
WePow
Published By: FICO     Published Date: Aug 14, 2015
Learn how FICO helped to transorm Norwegian pension management with rules management technology.
Tags : 
fico, analytics, solutions, decision management, rules management.
    
FICO
Published By: FICO     Published Date: Aug 14, 2015
Learn how FICO's Blaze Advisor system enables Aviva's vision of doubling business volume and improving customer service.
Tags : 
fico, analytics, solutions, decision management, rules management.
    
FICO
Published By: FICO     Published Date: Aug 14, 2015
To create a centralized and standardized, user-friendly system that enables internal and independent insurance agents to make precise and consistent policy quotes and uniform underwriting decisions, ACG adopted FICO's Blaze Advisor decision rules management system.
Tags : 
fico, analytics, solutions, decision management, rules management.
    
FICO
Published By: FICO     Published Date: Aug 14, 2015
Using predictive analytics and decision management to put customers at center stage.
Tags : 
fico, analytics, solutions, decision management, rules management.
    
FICO
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: Act-On     Published Date: Jul 08, 2015
The old rules of relying on metrics like brand awareness, cost per lead, and lead-to-sales conversion rate are in need of an update. So what metrics should you focus on today? Find out with this guide.
Tags : 
b2b, metrics, marketing strategy
    
Act-On
Published By: HPE     Published Date: May 04, 2015
How the New Style of IT changes the rules of business. The balancing act - What IT environment should be enabled to achieve the business outcomes you desire - While IT environments are in a rapidly changing landscape
Tags : 
    
HPE
Published By: HPE     Published Date: May 04, 2015
How the New Style of IT changes the rules of business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
    
HPE
Published By: HPE     Published Date: May 04, 2015
How the New Style of IT changes the rules of business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
    
HPE
Published By: HPE     Published Date: May 04, 2015
How the New Style of IT changes the rules of business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
    
HPE
Published By: HPE     Published Date: May 04, 2015
Get expert insight from HP and IDG in this brand new webinar. Discover how the new style of IT changes the rules of business. Choose from 4 chapters or watch them all to learn about optimizing compute economics and speeding IT service delivery to achieve better business outcomes. Register now to get started.
Tags : 
    
HPE
Published By: Oracle     Published Date: Apr 27, 2015
In the white paper, leading CFOs share perspectives on building and developing finance departments. Findings underscore value in the human touch and investment in new technology. The paper distills six rules for drawing talent to—and results from—finance departments in the Digital Age.
Tags : 
finance, management, retention
    
Oracle
Published By: Litmos     Published Date: Apr 23, 2015
Download this list of the 10 Rules of Retail Sales training to learn how to optimize employee performance and improve your customers' experience.
Tags : 
retail sales training, merchandising campaigns, customer satisfaction, merchandise displays, mobile devices, litmos
    
Litmos
Published By: Oracle     Published Date: Apr 22, 2015
This white paper distills six rules that modern CFOs worldwide are adopting to attract, retain and nurture finance talent with the skills needed to put finance at the heart of data driven business decision making across the enterprise.
Tags : 
digital, finance, modern finance, finance departments, attract finance talent, big data, cfos, modern business challenges, technology
    
Oracle
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.