target

Results 1051 - 1060 of 1060Sort Results By: Published Date | Title | Company Name
Published By: FICO EMEA     Published Date: Jan 25, 2019
As telecom markets become more saturated and competitive, your customer decisions must become more precise. As regulatory oversight expands, they must be demonstrably fair to consumers and explainable to regulators. Across the credit lifecycle, these more targeted decisions should be aligned with regulatory requirements. Download the Product Sheet and help your company drive performance improvements by making predictably, consistently better decisions across your credit lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: Loop Commerce     Published Date: Mar 08, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
    
Loop Commerce
Published By: Loop Commerce     Published Date: Mar 11, 2019
In the battle for e-commerce domination, few can stand up against Amazon's 2-Day shipping. It has taken the country by storm since it was introduced. Retailers have been forced to get creative and innovative to stay relevant in this on-demand society. Amazon threw a jab with its 2-Day shipping, but with GiftNow, Target just landed an uppercut.
Tags : 
    
Loop Commerce
Published By: Loop Commerce     Published Date: Mar 11, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
    
Loop Commerce
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, todayís law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firmís long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firmís eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In todayís increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Published By: Instructure     Published Date: May 17, 2019
At Bridge, we know that a big problem facing sales leaders is not being able to onboard or train reps quickly enough to reach targets. In fact, it takes 50% of new reps 6 to 10 months to contribute to quotas. This guide is for sales leaders looking to elevate their teams and realise faster, more effective onboarding from 'Day One'. It helps at every step in the onboarding process, from hiring to providing reps with continuous learning.
Tags : 
    
Instructure
Published By: Instructure     Published Date: Jun 14, 2019
At Bridge, we know that a big problem facing sales leaders is not being able to onboard or train reps quickly enough to reach targets. In fact, it takes 50% of new reps 6 to 10 months to contribute to quotas. This guide is for sales leaders looking to elevate their teams and realise faster, more effective onboarding from 'Day One'. It helps at every step in the onboarding process, from hiring to providing reps with continuous learning.
Tags : 
    
Instructure
Published By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
    
RMS
Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: