behavioral

Results 51 - 75 of 87Sort Results By: Published Date | Title | Company Name
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security, anti spyware, anti virus
    
Process Software
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development
    
Webroot
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: Genius Inc     Published Date: Mar 11, 2010
Based on a survey of over 100 B2B buyers, DemandGen Report and Genius.com uncover the purchase patterns of the new generation of B2B Buyer. It's clear that buying habits have changed and customers are: •More educated about solutions and competition than ever before •More opportunistic and impulsive in their buying behavior •More resourceful and connected to other buyers
Tags : 
b2b, btob, demand generation, demand gen, genius, social media, behavioral marketing, next gen
    
Genius Inc
Published By: Junta42     Published Date: Aug 20, 2009
This Junta42 whitepaper shows you how to develop a content marketing strategy that positions your company as the expert. Learn how to create and distribute valuable content that will add to your bottom line, and turn prospects into loyal customers.
Tags : 
branding, content marketing, junta42, loyalty, zoomerang, branding, content development, editorial, b2b, behavioral, customer segment, media, content-specific
    
Junta42
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Jive     Published Date: Feb 12, 2015
Enabling a "digital business" is becoming an increasing priority for organizations; the transition to enabling a digital interaction model inside an organization is twofold. There are technologies that underpin interactions as well as the cultural and behavioral changes that support this transition. Enterprise social networks (ESNs), and more broadly, social workflow, can play a significant role in this particularly when thought of as both a platform and a social workflow embedded in business systems where users are getting work done. This study identifies several key areas of market opportunity and provides criteria by which vendors can be judged now and over the next 5 years.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Published By: SPSS     Published Date: Jun 30, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS, Inc.
Published By: Eyeblaster, Inc.     Published Date: Apr 02, 2009
One of the big challenges faced by online marketers and agencies that handle large online budgets is maximizing conversions and optimizing online budgets at zero or minimum cost. This issue of the Eyeblaster Analytics Bulletin presents findings on conversions and a multitude of methods that can be deployed to ensure a better yield of successful digital campaigns.
Tags : 
eyeblaster, click-thru rate, conversion rate, format type, conversion rate, rich media, data capture, ctr, automatic optimization, conversion metric, behavioral sequencing, optimization, roi, post-click, post-impression, see-click-convert, see-delay-convert, recall, in-banner, e-commerce
    
Eyeblaster, Inc.
Published By: Quantcast     Published Date: Feb 13, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day and in turn, Mobile marketing has developed into a sophisticated, personalised marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, advertising solutions, mobile consumers, personalized marketing channels
    
Quantcast
Published By: Oracle     Published Date: Jan 07, 2014
Most enterprises understand the importance of listening to customer comments and conversations through social channels, and engaging and developing relationships with influencers and customer communities. But as the variety, volume, and velocity of social data continues to grow, many organizations are looking for cost-effective ways to use this data to get a better understanding and more holistic view of their customer. Social provides a unique channel to learn about your customer, and offers real-time insights like interests, actions, likes and dislikes that can provide invaluable behavioral and predictive data patterns. This social data (when aggregated with enterprise CRM data) reveals a more complete picture and understanding of customers.
Tags : 
social crm social roi, social media analytics, cmo and cio collaboration, socially enabled enterprise, social business, social data, social marketing, social media management, social relationship management, marketing and technology collaboration, cmo and cio relationship, customer insight, customer experience, knowledge management
    
Oracle
Published By: Evergage, Inc.     Published Date: Mar 10, 2016
Download this eBook TODAY and gain the insights necessary to support an effective intent-driven personalization strategy for your organization!
Tags : 
intent-based marketing, intent-driven personalization, behavioral analytics
    
Evergage, Inc.
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud, network security, hacker detection, intrusion detection, data protection
    
Fireblade
Published By: Quantcast     Published Date: Jan 07, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing utility, information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day, and Mobile marketing, in turn, has developed into a sophisticated, personalized marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, personalized marketing channel, mobile solutions, mobile landscape
    
Quantcast
Published By: Semcasting     Published Date: Feb 19, 2014
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: Boomtrain     Published Date: Mar 29, 2016
Learn how to get more value out of your traffic by turning nameless visitors into loyal, engaged subscribers.
Tags : 
audience development, user engagement, audience engagement, audience retention, user retention, content personalization, email personalization, web personalization, behavioral data, anonymous users, best practices
    
Boomtrain
Start   Previous    1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.