websites

Results 176 - 192 of 192Sort Results By: Published Date | Title | Company Name

Forrester: Top 10 Ways To Improve Digital Experiences

Published By: Adobe     Published Date: Aug 22, 2013
This report gives customer experience professionals the tools and processes they need to act on digital customer experience improvement across touchpoints like websites, mobile phones, and tablets. Forrester recommends 10 tactics for evaluating digital touchpoints and determining customers' needs, proven and emerging methodologies for redesigning digital interactions, and best practices for ensuring that your digital experiences support your business objectives.
Tags : 
customer experience management, digital experiences, customer experience
    
Adobe

Best of the Best Benchmark (Europe)

Published By: Adobe     Published Date: Oct 30, 2014
The Best of the Best Benchmark report compares the overall average versus websites in the top 20% on 6 key performance indicators across six regions ó United Kingdom, France, Germany, BeNeLux, Nordics and United States.
Tags : 
measuring your online presence, best of the best benchmark report, evaluating marketing techniques, increasing marketing trending
    
Adobe

Rank Higher with Thawte Always On SSL - Infographic

Published By: Thawte     Published Date: Dec 29, 2015
Promote safer websites and help create a more secure web.
Tags : 
    
Thawte

Online merchants and E-tailers: Preparing for the 2014 Holiday Shopping Season

Published By: Symantec     Published Date: Dec 04, 2014
With 93% of people doing at least some of their holiday-season shopping with online merchants, e-tailers of every kind need to get their websites in gear and ensure their customers feel confident shopping on their site. Whether itís shopping online, in store pick-up, or even browsing and wish lists, customers are offering you an unprecedented amount of data and sales this season. But fail to keep your customers safe with good website security, and all youíll get is a lump of coal in your stocking.
Tags : 
online merchants, e-tailers, holiday, holiday season, website security, shopping, security
    
Symantec

IBM Mobile Web Push Interactive Demo

Published By: IBM     Published Date: Apr 22, 2014
Learn how your business can push targeted campaigns across your mobile, tablet and desktop websites in minutes in this interactive demo.
Tags : 
ibm, emm, smartphone, mobile, push notifications, push marketing, targeted campaigns, mobile device
    
IBM

Adobe Digital Index: Best of the Best Benchmark 2014

Published By: Adobe     Published Date: May 15, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. Youíll see critical metrics on everything from mobile trends to conversion ratesóso you can develop new strategies for success in 2014.
Tags : 
adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate
    
Adobe

Adobe Digital Index: Best of the Best Benchmark 2014

Published By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. Youíll see critical metrics on everything from mobile trends to conversion ratesóso you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : 
online marketing, marketing practices, mobile usage trends
    
Adobe

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, itís online fraud to the highest degree. Although itís been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

Detecting Sophisticated Bots with Bot Manager Premier

Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies

See Why Gartner Named Akamai a WAF Leader

Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies

Case-in-Point: Cloud Contact Center helps WMPH Vacations enrich customer experiences

Published By: 8x8 Inc.     Published Date: Feb 13, 2017
WMPH has nine sub-brands, each of which sells cruises to customers through distinct websites, including iCruise.com, AlaskaCruises,com and HawaiiCruiseOutlet.com. Given that each consumer has unique expectations from a cruise, the organization uses its websites as a touch-point to educate buyers about different options. Once buyers learn the different options available, they are then encouraged to interact with the contact center for a one-on-one consultation to help design a cruise which meets their unique needs.
Tags : 
wmph, icruise.com, alaskacruises.com, hawaiicruiseoutlet.com, touch-point, cloud contact center
    
8x8 Inc.

Fighting Fraud with Intelligent Access Management

Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocentóbut sometimes devastatingóerrors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM

Web Customization in 5

Published By: Progress     Published Date: Jan 22, 2019
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but donít have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress

The truth about information governance and the cloud

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Chatter about the cloud is everywhere. You can't turn on your TV, look at your smartphone, open a magazine or browse websites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, create a way to manage hard drive space on your phone and much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers.
Tags : 
    
Group M_IBM Q418

Complete Website Security Brochure

Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. Thatís why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert

The High Cost of Poor Website Security

Published By: DigiCert     Published Date: Jun 19, 2018
Your organizationís websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert

Humanizing Digital 2020 Shopping Expectations of U.S. Consumers

Published By: Zoovu Limited     Published Date: Mar 20, 2019
Donít get me wrong Ė several aspects of life are much easier now thanks to the existence of the internet and digital technologies. People can jump between mobile, tablet, and desktop to search for vital information. They can read blogs, listen to podcasts, stream their favorite TV shows and keep in touch with people they careabout via social media. And it lets people shop, anytime and anywhere. The myriad of options available to todayís consumers allows them to visit the websites of numerous vendors and explore countless products. This is where things begin to get complicated - for shoppers and businesses: While itís true to say that humans like choice, its omnipresence is quickly turning into noise. Without appropriate assistance and guidance, consumers are feeling overwhelmed, anxious and unable to make confident decisions. And, overwhelmed and indecisive customers rarely buy.
Tags : 
    
Zoovu Limited
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.