personal data

Results 76 - 100 of 295Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 13, 2015
This ebook explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions.
Tags : 
customer centric organizations, crm, customer usability, personalized interactions, big data, data quality, data management, internet marketing
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
How can organizations tap into the vast flow of data, weed out the information that matters, and then link that meaningful sentiment to specific customers? This e-book explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions.
Tags : 
personalized customer interaction, customer experience, data, marketing channels
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
In its "Restoring Connections" paper based on research of telecommunications firms, IBM Ďs top ranked Institute for Business Value identified actions CSPs can take to reset customer experience and build brand loyalty through innovative, compelling, personalized services based on deep customer insight. Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : 
ibm, telco, customer analytics, csps, consumer behavior, brand loyalty, personalized engagement, big data
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics
Published By: Lookout     Published Date: Sep 25, 2017
ďWe donít have a BYOD programme.Ē This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they arenít actually subject to cyber-threats from mobile devices because, simply, they donít currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Adobe     Published Date: Jun 26, 2019
To achieve personalization at scale, brands need to develop a better understanding of each customer they interact with, and thatís all about combining all the data they collect from every available source into a single cohesive customer view. There is no way they can handle this task or manage all this data manually, which is why data management platforms (DMPs) rose to prominence. Today, companies are looking to build on this single customer view with a real-time understanding of their audience across every digital channel, marking the next phase on the maturity ramp for DMPs.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 12, 2016
Personalization is no longer just about using data to learn about your customers and deliver relevant content. As channels and devices evolve, personalization is also about using your data to deliver experiences that every customer finds engaging.
Tags : 
adobe, design, personalization, device, engagement, crm & customer care, marketing research
    
Adobe
Published By: Adobe     Published Date: Sep 20, 2016
Read our new white paper, Experience Design Optimization: Where Personalization Goes to Grow Up, and learn: - The experience design optimization process - How top brands are using data to design experiences that drive conversion - The four steps toward differentiating your brand with personalized experiences
Tags : 
adobe, customer experience, deisgn, experience deign optimization, traditional marketing
    
Adobe
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‚Äźmakers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‚Äźprocess changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized
    
SRC,LLC
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance Todayís workforce has grown accustomed to using personal technologies that make communication easy and simplify their lives. But many enterprise tools havenít kept pace. Most current project and portfolio management solutions fail to provide simple ways of performing everyday tasks. They donít facilitate contextual communication that would help to solve problems, and they lack key functionality: the ability to narrow the focus to relevant data, to drill down for additional information and to efficiently forecast financials and model outcomes. Download this whitepaper now to see how CA PPM brings more value to your business by providing 15 key features that remain unaddressed by other products on the market today.
Tags : 
    
CA Technologies EMEA
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. Youíll learn: The common challenges of data security Steps to solve these challenges And much more
Tags : 
finance, data security, security risks, encryption
    
Citrix ShareFile
Published By: Datastax     Published Date: May 14, 2018
"Whatís In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
    
Datastax
Published By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared Ė and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task Ė before you protect your data, you must understand it, and even once youíve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
    
IBM
Published By: Adobe     Published Date: May 15, 2014
Adobe strives to help marketers not only collect and analyze data, but to turn data into relevant actions that reach customers in personal ways. Forrester has gathered the trends of big data and rich data to give you a sense of how they'll be used differently in 2014.
Tags : 
adobe, forrester, customer insights, big data, social media, mobile marketing, cross channel marketing, multi-touchpoint
    
Adobe
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, itís online fraud to the highest degree. Although itís been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Adobe     Published Date: Jun 26, 2019
Get inside the minds of key decision-makers in mid-size companies who are tackling todayís biggest content management challenges. Learn how theyíre thinking, what they see as opportunities, and how theyíre planning to come out on top. With more than 7,000 CMS solutions available from more than 6,000 unique suppliers, you have a mind-boggling array of options ó making it hard to know which path to take and how to decide. Here's your chance to get inside the minds of key decision-makers who are tackling todayís biggest content management challenges: - Personalization - Keeping up with current technology - Difficult-to-use content management systems - Over-reliance on IT teams for simple functions - Inadequate access to customer data and insights - Integrating third-party apps - Managing and optimizing content
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Tags : 
    
Adobe
Published By: SessionM     Published Date: Jan 24, 2018
Download Gartnerís latest Market Guide for Master Data Management of Customer Data Solutions to learn market definition, analysis and recommendations, the criteria necessary for evaluating marketing data management solutions and how master data sits in the middle of the 360į customer view.
Tags : 
customer engagement, unified customer profile, customer data platform, data orchestration, customer data activation, machine learning, data integration, personalization
    
SessionM
Published By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, youíll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: ē How to view GDPR as an opportunity, and how you can build on it ē Article 32 Ė a core part of the security principle ē Data subject rights ē Key players and responsibilities ē And much more
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Sage People     Published Date: Jan 04, 2019
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPRís focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handledóand it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and itís vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world wh
Tags : 
    
Sage People
Published By: Sage EMEA     Published Date: Dec 19, 2018
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPRís focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handledóand it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and itís vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world where 2,
Tags : 
    
Sage EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.