behavioral

Results 1 - 25 of 99Sort Results By: Published Date | Title | Company Name
Published By: Silverpop     Published Date: Sep 19, 2011
10 tips for expanding your behavioral knowledge base, shaping your content and leveraging timing so you deliver the ideal message at the perfect moment, plus real-life examples of how companies have made it happen.
Tags : 
silverpop, marketing, right message, email, social media
    
Silverpop
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus, application security, email security, internet security, network security appliance
    
Blue Coat Systems
Published By: Forcepoint     Published Date: Oct 02, 2019
If you want greater—and earlier—visibility into indicators of security threats like intellectual property theft, compromised accounts, and insider risk, behavioral analytics may be the answer. Download this Gartner Market Guide if you’re considering or planning to integrate User and Entity Behavior Analytics (UEBA) to augment other security solutions or achieve risk-adaptive protection.
Tags : 
    
Forcepoint
Published By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen
    
Unica
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: Niara     Published Date: Jan 29, 2016
This handy guide, that also includes an evaluation checklist, will help you select one that’s right for your organization.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Niara     Published Date: Jan 27, 2016
Download this whitepaper to learn some common myths to consider when deploying security analytics solutions.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics, it management
    
Niara
Published By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : 
advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics, security, it management
    
Niara
Published By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : 
audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data, third-party data, first-party data, digital marketing, single factor correlation, multiple factor correlation, predictive audience models, custom audiences, offline data, effective marketing practices, digital marketers, marketing funnel, trusignal
    
TruSignal
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In his 1966 book “The Psychology of Science,” American psychologist Abraham Maslow tackled the idea that those in the field of psychology needed to approach treatment from multiple perspectives, to take on new ideas, and not just continue using the same theories and techniques created by Freud and his followers so many years ago. It may seem curious to refer to psychology in a work on REST and API Design, but it works to illustrate two distinctive points: (1) that all design decisions, regardless of whether they pertain to software or architecture, should be made within the context of functional, behavioral, and social requirements—not random trends; (2) when you only know how to do one thing well, everything tends to look identical. To get started, let’s take a look at REST in some detail by downloading this whitepaper today.
Tags : 
    
CA Technologies EMEA
Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
Forcepoint
Published By: Skillsoft     Published Date: Mar 27, 2015
In a leadership survey, the results reveal that respondents understand the attributes and behavioral trends that will drive success and innovation into the future, yet acknowledge that their organizations are celebrating and encouraging many behaviors and practices that created success in the last century. Where does your organization fit in? Are you encouraging yesteryear leadership traits? Download Actionable Leadership in the Creative Age and learn how to foster the right leadership traits within your organization.
Tags : 
leadership, leadership development, leadership behaviors, leaders, managers, grit, human resources
    
Skillsoft
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Omniture     Published Date: Oct 10, 2007
Wish you could target your online customers on a 1-to-1 basis? Now you can. Learn how on-site behavioral targeting from Omniture Touch Clarity can help you to achieve 40-200% automated uplift in revenue, conversion rates or profitability. It pays be more relevant.
Tags : 
behavior, behavioral, behavioral marketing, behavioral targeting, target, targeting, omniture
    
Omniture
Published By: [x+1]     Published Date: Jan 24, 2007
Behavioral targeting, specifically with regards to the audience optimization process, opens a new level of accountability in the marketing space. Learn how testing and indexes such as the VPM index can make marketers more accountable for their results, paving the way for improving your marketing strategy.
Tags : 
behavioral marketing, user-centered design, content personalization, conversion testing, targeting, audience targeting, behavioral targeting
    
[x+1]
Published By: Bluecore     Published Date: Sep 27, 2018
Review a sampling of behavioral and catalog triggers as well as personalized batch sends used by a variety of retailers during the holiday season.
Tags : 
bluecore, email marketing, holiday shopping, holiday season
    
Bluecore
Published By: Genius Inc     Published Date: Mar 11, 2010
Based on a survey of over 100 B2B buyers, DemandGen Report and Genius.com uncover the purchase patterns of the new generation of B2B Buyer. It's clear that buying habits have changed and customers are: •More educated about solutions and competition than ever before •More opportunistic and impulsive in their buying behavior •More resourceful and connected to other buyers
Tags : 
b2b, btob, demand generation, demand gen, genius, social media, behavioral marketing, next gen
    
Genius Inc
Published By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Published By: Oracle OMC     Published Date: Nov 30, 2017
Since the theme of this brief is to keep things simple, let’s be as simple and plain as possible: The customer experience (CX) is broken because the marketer experience is broken. However, it’s not entirely marketing’s fault. Legacy technology provides only a distorted view of the customer. That’s what creates the broken experiences. It’s the same technology that—while providing rich behavioral, demographic, and preference data—does not allow for silos of data to be shared across channels.
Tags : 
    
Oracle OMC
Published By: SAP     Published Date: Nov 17, 2016
Culture has become one of the most important business topics of 2016. CEOs and HR leaders now recognize that culture drives people's behavior, innovation, and customer service: 82 percent of survey respondents believe that "culture is a potential competitive advantage." Knowing that leadership behavior and reward systems directly impact organizational performance, customer service, employee engagement, and retention, leading companies are using data and behavioral information to manage and influence their culture.
Tags : 
sap, human resources, employee, deloitte, culture
    
SAP
Published By: BetterUp     Published Date: Dec 05, 2018
American corporations invest an estimated $160B on learning and development initiatives. But since employees forget up to 75% of what is taught, $120B of that investment is wasted. So, it's no wonder that 70% of organizational transformations fail. This eBook details what's required for successful individual transformation, from Learning to Doing to Being, incorporating the latest evidence from fields across the behavioral sciences.
Tags : 
    
BetterUp
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Start   Previous   1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.