consumers

Results 151 - 175 of 713Sort Results By: Published Date | Title | Company Name
Published By: Neustar     Published Date: Aug 20, 2012
TARGUSinfo introduces you to the buying behaviors and patterns of today's insurance consumer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization, site customization, web messaging, landing page customization, consumer identification, consumer verification, consumer qualification, score leads, score consumers, verify leads, verify consumers, search marketing, email marketing
    
Neustar
Published By: Neustar     Published Date: Aug 20, 2012
Lead Scoring remains a hot topic in the lead generation industry. Now, online marketers can gain even more insight into their lead scores with Lead Optimization. What's the difference between Scoring and Optimizing?
Tags : 
lead scoring, lead optimization, marketing analytics, lead qualification, lead routing, lead quality score, consumer score, consumer analytics, online lead generation, campaign optimization, score leads, score consumers, search marketing, email marketing, social media, internet marketing, e-commerce
    
Neustar
Published By: Neustar     Published Date: Feb 27, 2013
Neustar® Information Services introduces you to the buying behaviors and patterns of today’s insurance customer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization, site customization, web messaging, landing page customization, consumer identification, consumer verification, consumer qualification, score leads, score consumers, verify leads, verify consumers, b2c, business to consumer
    
Neustar
Published By: Neustar     Published Date: Feb 27, 2013
This case study shows how On Demand Verification plays an important role in increasing business and improving efficiencies for Santander.
Tags : 
auto verification, loan verification, contact verification, consumer verification, real time verification, risk management, loan processing, loan optimization, consumer validation, consumer qualification, verify leads, verify consumers, b2c, business to consumer
    
Neustar
Published By: Salesforce.com     Published Date: Oct 28, 2013
Just 7% of consumers say that customer service experiences they have with companies typically exceed their expectations. Now think about how you could succeed and profit as a business if you not only continually offered good service to your customers, but also frequently offered more than what they expected. Discover: The secrets to lining up your customer service with your brand. The best way to train employees. How to make employees feel good about giving great service. The significance of monitoring customer interactions. Which customer metrics you should pay attention to. The cheapest way to earn new customers. Download this ebook to learn what you need to do to give customers what they want and earn a customer for life!
Tags : 
customer service, best practices, 6 secrets, managing expectations, employee training, metrics, customer interactions
    
Salesforce.com
Published By: AppDynamics     Published Date: Aug 25, 2015
This report from Forrester Research shows how, in today’s digitally-driven world, applications are at the center of the universe. They are the point atop the pyramid where code, data, and modern technologies such as cloud and the Internet of Things (IoTs) interact to enrich the lives of consumers, perform useful scientific and medical work, and drive business value.
Tags : 
industry, application management, performance, tools, it management, application integration, application performance management, business intelligence, productivity, infrastructure
    
AppDynamics
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: SAP     Published Date: Jul 20, 2015
However, here at SAP we have identified four broad technology trends that are currently having a major impact on how retailers conduct business and engage with consumers. They are Big Data, social media, seamless retailing and disruptive technologies. Read this report for an analysis and overview of each trend area, why they are important and what the future likely holds.
Tags : 
it trends, retail, big data, social media, seamless retailing, disruptive technology, trends, crm & customer care
    
SAP
Published By: Mitel     Published Date: Mar 30, 2017
It's no secret that mobile technology has revolutionized the way consumers conduct their lives. Mobile technology has become ubiquitous, influencing the business workplace and workforce. Last year, IDC predicted that 75% of the US and nearly 40% of the global workforce would be mobile and signs indicate that the rate of mobile growth is only being accelerated by the advancement of cloud technology, improved security, and more reliable network access.
Tags : 
    
Mitel
Published By: Ping Identity     Published Date: Feb 12, 2016
There’s been a fundamental shift in best practices over the last decade to accommodate new multiple-screen behaviors seen by 70% of Internet-connected consumers. The disconnected nature of a siloed channel-by-channel approach won’t provide the consistent end-to-end experience that today’s connected consumer demands.
Tags : 
    
Ping Identity
Published By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Ubiquitous connectivity and mobile devices have changed everything, opening up markets to millions of new consumers across the globe. Within the past few years, nimble upstarts have created mobile apps that have converted banking customers, cab riders and hotel guests at unprecedented rates. Large, established brands are scrambling to transform their businesses in order to maintain market share. To compete in this application economy, you must adapt or be left behind.
Tags : 
testing effort, delivery model, sdlc, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting, cash reconciliation, cash transaction, fraudulent currency, counterfeit detection, counting errors, shrinkage, reconciliation
    
Fiserv
Published By: Fiserv     Published Date: Aug 23, 2018
Even with the rise of digital payments, cash is still a popular form of payment. According to the Federal Reserve, consumers use cash to pay for nearly one-third of all retail transactions. For many retailers, a completely "cashless society" is nowhere in sight. Cash management remains one of the most important aspects of managing a retail operation, particularly at quick service restaurants (QSRs) and convenience stores, where transactions are smaller and cash is a preferred method of payment. This white paper, Boost Profitability by Automating Cash, sponsored by Fiserv and Fast Casual, details the steps to manage cash properly and boost profit for your business. Uncover the top reasons and flexible options to automate your cash management. • Time savings • Theft deterrence • Higher accuracy • Better customer service • Real-time data
Tags : 
cash automation, smart safe, cash loss, cash handling, automated cash handling, cash management, cash reconciliation, manual cash reconciliation, automated cash reconciliation, automated vault, cash counting, cash automation system, cash deposits, cash recycler, cash dispensers, cash drawer, point of sale
    
Fiserv
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: Applause Israel     Published Date: Jun 19, 2018
study by UPS and comScore found that 53% of shoppers who don’t use retailers’ mobile apps state it’s because they like using the website better. These shoppers see no benefit from installing these apps, as they provide an inferior experience with no added benefits. Looking at the Apple and Google Play App Stores, a large amount of retailers have apps with very few reviews, and some don’t even have a mobile app. Another problem is the performance of retail apps. 61% consumers expect an app to load in under 4 seconds according to research by Dynatrace. In its study, only one retailer made it under that threshold. And that is just purely opening the app. What is the experience once consumers get past that point?
Tags : 
    
Applause Israel
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
Published By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : 
ugc, user generated content, revenue, curalate, social media, millenials
    
Curalate
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: