personal data

Results 201 - 225 of 299Sort Results By: Published Date | Title | Company Name
Published By: Dun & Bradstreet     Published Date: Aug 22, 2016
You’ll learn: Why personalization is particularly difficult for B2B How marketers are using data to customize content today Clear steps to making your database mission-ready How to prioritize your personalization efforts for the highest returns
Tags : 
personalized b2b marketing, b2b buyers, b2b, marketing, personalization
    
Dun & Bradstreet
Published By: Sailthru     Published Date: Aug 15, 2016
Download this guide to discover how to find a partner that moves beyond antiquated batch-and-blast methodologies to impact: -Customer retention rates and revenue -Personalization sophistication -Cross-channel marketing capabilities -Effective reporting, impactful data and predictive analytics Who should download: -Internet Retailer Top 1,000 Digital Marketing executives -Directors of CRM and Ecomme
Tags : 
sailthru, retail, rfp, request for proposal, marketing, internet retailer, top 1000, internet marketing, e-commerce, sales
    
Sailthru
Published By: LogRhythm     Published Date: Aug 08, 2016
THE TIME HAS come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Tags : 
cyber threat, cyber risk, technology, best practices
    
LogRhythm
Published By: SAS     Published Date: Aug 03, 2016
Whether you call them customers, clients, patrons, guests or patients, customers are your organization’s most important asset. And that means customer loyalty should be among your top priorities. No matter when or where the customer journey begins – from websites and online chat to physical locations and call centers – customers expect you to provide a unique and personal experience. How can you use data and analytics to recognize your best customers across channels and know exactly where they are in their customer journey? Keep reading to find out.
Tags : 
best practices, business management, customer loyalty, technology, data, analytics
    
SAS
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance
    
Commvault
Published By: Adobe     Published Date: Apr 25, 2016
Data is the key to doing this. But simply collecting it won’t take you all the way. You must use the data to create holistic customer profiles, then use those customer profiles to create interesting, personalised and memorable experiences. This three-part, step-bystep eBook series explains how to actually use data to provide each customer with the best experience possible.
Tags : 
customer experience, marketing, data management, customer experience/engagement, data management/analytics
    
Adobe
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: Cisco     Published Date: Apr 20, 2016
Note: Part two of Karen Walker’s blog series continues her insights about Digital Transformation and spotlights how Cisco’s Marketing and Communications team is using technology to transform their function. Excerpt: Today’s marketers are delivering more and more content digitally, but to be effective that digital content can’t just be generic reference material. Rather, effective content must be relevant, timely, and personalized. And its goal should be to create a dialogue with the customer. This is no easy task. It requires investing in marketing technologies that help deliver personalized content with speed and agility. For modern marketers, technology opens the door to new revenue pipelines. Digital platforms and applications combined with data and analytics augment our go-to-market model.
Tags : 
cisco, digital, marketing, technology, mobile, marketing strategy, emerging marketing, internet marketing, crm & customer care
    
Cisco
Published By: IBM     Published Date: Apr 14, 2016
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs). Learn how CSPs can use customer behavior data to deliver personalized experiences and offers, and discover the solutions that can turn data into a competitive advantage.
Tags : 
ibm, behavior data, social media, csp, telecom, ott, customer experience/engagement
    
IBM
Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection
    
Logrhythm
Published By: Adobe     Published Date: Feb 12, 2016
Personalization is no longer just about using data to learn about your customers and deliver relevant content. As channels and devices evolve, personalization is also about using your data to deliver experiences that every customer finds engaging.
Tags : 
adobe, design, personalization, device, engagement, crm & customer care, marketing research
    
Adobe
Published By: Ping Identity     Published Date: Feb 12, 2016
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Tags : 
    
Ping Identity
Published By: Adobe     Published Date: Feb 08, 2016
In Ten Ways Cross-Channel Marketing Is Not Rocket Science, you’ll learn how to connect with your customers and reach them in personal and relevant ways — all from reliable data you collect.
Tags : 
adobe, cross-channel marketing, marketing guide, customer journey, customer relationships, customer loyalty, email marketing, crm & customer care, marketing research
    
Adobe
Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management
    
MuleSoft
Published By: Symantec     Published Date: Nov 30, 2015
This paper will explain SSL, the different types of certificates, how cybercriminals use DV certificates to steal personal and financial data, and what can be done to thwart this tactic.
Tags : 
    
Symantec
Published By: Sitecore     Published Date: Nov 05, 2015
For the additional benefit of complete insight into each unique visitor's experience with your website, link activity to an existing database or CRM, and get the full picture of your customers at your fingertips.
Tags : 
sitecore nfusion, website personalization, crm, customer loyalty, database, website development, marketing research
    
Sitecore
Published By: Adobe     Published Date: Sep 22, 2015
Marketers who see the customer path as a linear funnel are out of touch with their customers. The customer path contains multiple channels where customers expect marketers to remember their preferences and anticipate their needs. In Ten Ways Cross-Channel Marketing Is Not Rocket Science, you’ll learn how to connect with your customers and reach them in personal and relevant ways — all from reliable data you collect.
Tags : 
adobe, cross channel marketing, digital marketing, campaign management, emerging marketing, internet marketing, crm & customer care, traditional marketing
    
Adobe
Published By: Crownpeak     Published Date: Sep 08, 2015
The Race to Personalization - 5 Data-Backed Reasons Personalization Needs to Be Part of Your Marketing Strategy!
Tags : 
crownpeak, web content management, web experience management, personalization, marketing, content marketing, content personalization, roi, web experience, customer experience, website development, internet marketing, crm & customer care
    
Crownpeak
Published By: Windstream     Published Date: Aug 12, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing, data center, innovation, strategy, expansion, customer service, agility, migration, performance, complexity, system, value, roi
    
Windstream
Published By: IBM     Published Date: Jul 31, 2015
In its "Restoring Connections" paper based on research of telecommunications firms, IBM ‘s top ranked Institute for Business Value identified actions CSPs can take to reset customer experience and build brand loyalty through innovative, compelling, personalized services based on deep customer insight. Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : 
ibm, telco, customer analytics, csps, consumer behavior, brand loyalty, personalized engagement, big data
    
IBM
Published By: IBM     Published Date: Jul 13, 2015
This ebook explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions.
Tags : 
customer centric organizations, crm, customer usability, personalized interactions, big data, data quality, data management, internet marketing, crm & customer care, marketing research, sales
    
IBM
Published By: Gigya     Published Date: Jun 08, 2015
To get a look at the current state of data privacy and personalization, Gigya recently commissioned a survey with OnePoll to collect the perspectives of modern consumers. The results reveal that, when it comes to sharing their data with brands, consumers across the globe are demanding 3 key values: transparency, relevance and convenience.
Tags : 
data privacy and personalization, modern consumers, social login, consumer concerns, data privacy, customer experience/engagement
    
Gigya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.