user behavior

Results 51 - 75 of 89Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Apr 19, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
    
Forcepoint
Published By: Oath     Published Date: May 31, 2017
Understanding smartphone users’ behavior in the physical world is fueling the rise of location-based retargeting. Digital consumption on mobile devices surpassed desktop in 2015 and continues to grow. Using location as a signal of consumer activity and interest, advertisers can drive relevance and increase user engagement with their ads. Learn more in our infographic.
Tags : 
native advertising, native ads, search ads
    
Oath
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : 
entity, analytics, mcafee, enterprise, security, customer, environments
    
McAfee EMEA
Published By: BloomReach     Published Date: Dec 22, 2014
Introducing BloomReach Compass, a tool that understands your site's content and identifies opportunities to maximize revenue. Surface and prioritize opportunities out of your billions of datapoints from content details, user behavior, and business performance.
Tags : 
search marketing, email marketing, website development, emerging marketing, internet marketing, e-commerce, traditional marketing
    
BloomReach
Published By: Niara     Published Date: Jan 27, 2016
Download this whitepaper to learn some common myths to consider when deploying security analytics solutions.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : 
advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Niara     Published Date: Jan 29, 2016
This handy guide, that also includes an evaluation checklist, will help you select one that’s right for your organization.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Urban Airship     Published Date: Apr 17, 2014
In our latest Good Push Index data study (examining more than 2,400 apps and 500 million push notifications), we reveal how push messaging influences mobile app users’ behavior, measuring both engagement and retention over a six-month period.
Tags : 
urban airship, gpi, good push index, mobile marketing, mobile, mobile app, push notifications, customer engagement, smartphone, app engagement, mobile strategy
    
Urban Airship
Published By: Evergage     Published Date: Nov 18, 2013
Evergage increases conversions by helping your website respond in real-time with personalized messages to people based on where they clicked and who they are – all without coding.
Tags : 
real-time web personalization, data driven marketing, data driven messaging, user engagement, one-to-one marketing, personalized marketing, dynamic content, smart messaging, customer engagement, on site messaging, in app messaging, behavior analytics, target marketing, behavior segmentation, conversion rate experts, cro tools, prevent churn, internet marketing
    
Evergage
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network
    
CDW-Trend Micro
Published By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : 
customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
    
Intercom
Published By: LogRhythm     Published Date: Apr 04, 2017
The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven technology decisions.
Tags : 
    
LogRhythm
Published By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the technologies together to maximize each tool’s strengths.
Tags : 
ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
    
McAfee
Published By: Silverpop     Published Date: Feb 04, 2013
Shazam, the world’s leading mobile discovery service, wanted to leverage email to build on its in-app experience, increase user retention and deliver personalized content that drives revenue.
Tags : 
email marketing, engagement, crm, social, mobile, engegement, testing, optimization
    
Silverpop
Published By: Digital Bungalow     Published Date: Feb 09, 2015
Google Analytics is an excellent tool for gaining insights into user behavior and gathering data for site optimization.
Tags : 
google analytics, site optimization, customer acquisition, consumer behavior, advanced segments, emerging marketing
    
Digital Bungalow
Published By: IBM     Published Date: Oct 13, 2015
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs).
Tags : 
ibm, behavior data, csp, frost and sullivan, communications service providers, emerging marketing, crm & customer care
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Clicktale     Published Date: Aug 06, 2015
Web site errors eat away at conversions, KPIs, ROI, and revenues. The key to catching elusive website errors? Focus on the users. In this new ClickTale white paper, learn to identify common user dropoff or abandonment behavior patterns – which traditional tools simply cannot see. Once you pinpoint the errors themselves, you can assess their impact on user experience and conversions, and prioritize remediation.
Tags : 
website design, user experience, errors, web errors, digital customer experience, website elements, website layouts, web design, web page design, a/b testing, marketing errors, customer loyalty, kpis, manufacturing, website development, advertising agencies, internet marketing, e-commerce
    
Clicktale
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud
    
Fireblade
Published By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: AlienVault     Published Date: Jul 22, 2016
Join us for this technical demo showing how USM can help you detect: Malware infections on end-user machines Insiders misusing network resources Users engaging in suspicious behaviors
Tags : 
    
AlienVault
Published By: Boomtrain     Published Date: Mar 29, 2016
Learn how to get more value out of your traffic by turning nameless visitors into loyal, engaged subscribers.
Tags : 
audience development, user engagement, audience engagement, audience retention, user retention, content personalization, email personalization, web personalization, behavioral data, anonymous users
    
Boomtrain
Published By: AdRoll     Published Date: Apr 05, 2017
Did you know... • 57% of marketers are changing their attribution model this year • Almost 40% of marketers spend a majority of their budgets on measurement alone • 69% of marketers are using dynamic email based on user behavior This report from AdRoll compiles survey results from 1,300 marketers about how they coordinate various different channels and technologies to achieve their goals, and how they're thinking about the latest performance strategies across every stage of the marketing funnel.
Tags : 
performance marketing, marketing survey, marketing channels, marketing, performance, advertising
    
AdRoll
Published By: [x+1]     Published Date: Jan 24, 2007
Behavioral targeting, specifically with regards to the audience optimization process, opens a new level of accountability in the marketing space. Learn how testing and indexes such as the VPM index can make marketers more accountable for their results, paving the way for improving your marketing strategy.
Tags : 
behavioral marketing, user-centered design, content personalization, conversion testing, targeting, audience targeting, behavioral targeting
    
[x+1]
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: