atm

Results 76 - 87 of 87Sort Results By: Published Date | Title | Company Name

Block online fraudsters and identity thieves-by letting their own PCs snitch on them

Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence, security, anti spam, anti spyware, anti virus, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management
    
ThreatMetrix.

Secure your site against fraud without intrusive measures that cause customer dropoff

Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : 
threatmetrix, device identification, dropoff, security token, fraud prevention solutions, security, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management
    
ThreatMetrix.

Stop e-commerce fraud & its revenue loss without blocking legitimate online customers

Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology, security, anti spam, anti spyware, anti virus, firewalls, hacker detection, identity management, intrusion detection, intrusion prevention, security management
    
ThreatMetrix.

Block online fraudsters & identity thieves-by letting their own PCs snitch on them

Published By: ThreatMetrix     Published Date: Jan 21, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix

Stop e-commerce fraud & its revenue loss—without blocking legitimate online customers

Published By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology
    
ThreatMetrix

Secure your site against fraud without intrusive measures that cause customer dropoff

Published By: ThreatMetrix     Published Date: Jan 21, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : 
threatmetrix, device identification, dropoff, security token, fraud prevention solutions
    
ThreatMetrix

Revitalizing Healthcare Delivery with Mobile Communications (Part 1)

Published By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : 
blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging
    
BlackBerry

Patient-Centric: the 21st Century Prescription for Healthcare

Published By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : 
health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric, medicine, hospital, hospitals, ibm, best practices, customer service, hipaa compliance, web services, records management
    
IBM

The Brand Lift of Search

Published By: Mediative     Published Date: Jan 14, 2008
More and more, companies are realizing the importance of creating a strong online presence both in the free organic search results and the paid advertisements that appear alongside those results. The tracking features of website logs and the measurability of pay-per-click ads enable marketers to monitor the traffic of their organic listings and the performance of their online advertising campaigns. However, it's comparatively more difficult to determine how the placement of those search listings and online ads affect consumer brand perceptions.
Tags : 
search marketing, organic search, buying behavior, buying behaviors, ctr, search, branding, google, eyetracking, heatmapping, heatmap, enquiro, enquiro research
    
Mediative

CIPA - Keeping Students Safe on the Net

Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act, monitoring, compliance, hacker detection, internet security, security management, secure instant messaging, employee performance, desktop management
    
Cyberoam

5 Secrets to Increase Website Traffic

Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat

Using Predictive Analytics to Uncover Root Causes and Solve Problems vs. Treat Symptoms

Published By: Customer Chemistry     Published Date: Nov 14, 2006
Predictive analytics can be utilized to uncover root causes so that problems can be eradicated.  Read this white paper to learn how companies can use predictive analytics treatment and prevention approaches to save time and resources, eliminate root causes of problems, and obtain the actionable insight required to improve marketing effectiveness.
Tags : 
analytics, predictive analytics, marketing strategy, customer research, market trends, marketing roi, customer chemistry, enterprise applications, business analytics, marketing automation, sales & marketing software, analytical applications
    
Customer Chemistry
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.