Results 126 - 135 of 135Sort Results By: Published Date | Title | Company Name

Toyota Financial Services Optimizes Collections Treatments With a Customer-centric Approach

Published By: FICO     Published Date: Sep 02, 2016
Download this case study to learn how the Collections Treatment Optimization program powered by FICO® Xpress Optimization Suite and FICO® Model Builder helped more than 6,000 customers avoid repossession and stay in their cars, and prevented 50,000 customers from reaching a stage of delinquency that would affect their credit. The program also helped grow the lending portfolio by 9% without adding collections headcount.
Tags : 
toyota financial services, fico, collections treatment optimization, cto, collections, auto loans

UE General Data Protection Regulation (GDPR)

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Tenuto conto del fatto che la GDPR è stato annunciato formalmente solo di recente, si evidenzia un buon livello di consapevolezza tra i partecipanti. Una volta informati sul regolamento, l'88% degli intervistati ha dichiarato che la propria azienda deve affrontare difficoltà tecnologiche per la compliance alla GDPR. Il percorso verso la compliance è percepito come molto laborioso.
Tags : 
generazione di dati sintetici, virtualizzazione di servizi, controllo e protezione dei database, masking dei dati, warehouse dei dati, ca technologies, gdpr
CA Technologies EMEA

Understanding Your Cybersecurity Posture

Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 

Virtualización de datos TIBCO para la industria energética

Published By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization es una solución probada que es utilizada por cuatro de las cinco principales compañías de energía integradas para obtener más rápidamente una mayor cantidad de datos analíticos las operaciones de exploración y producción. Los casos de uso específicos que se describen incluyen: • Analítica de Datos de Plataformas Marítimas • Mantenimiento y Reparación de Pozos • Servicios de Datos Web en Refinerías • SAP Master Data Quality Si una compañía de energía está enfrentando desafíos relacionados con los datos y la analítica similares, debe considerar TIBCO Data Virtualization.
Tags : 
TIBCO Software

What Is Telecom Subscription Fraud — and How Can You Fight It?

Published By: FICO EMEA     Published Date: Aug 30, 2019
Fraud is a serious concern for the communications industry, with proceeds and services used by organised crime and terrorist networks. Whilst reliable statistics are difficult to come by, industry association Communications Fraud Control Association (CFCA) estimates the total global fraud loss at around $29bn annually. Of this, over $7bn is attributed to subscription fraud and account takeover. In an industry which is undergoing widespread digital transformation to streamline customer journeys and reduce operating costs through automation, preventing fraud is critical. Learn More
Tags : 
telecom subscription fraud, prevent fraud, fight fraud

When Is a Real-Time Payment Not a Real-Time Payment?

Published By: FICO EMEA     Published Date: Aug 28, 2019
There is a proliferation of payment methods that provide people with faster ways to make and receive payments – but they are not all the same. Understanding the differences and unique characteristics of different 'fast' payment types is vital to those who need to develop and service payments fraud strategy. Download our executive brief to understand: The differences between real-time payment schemes, e-wallets and person to person payments The implications on fraud from the fast transfer of money Where to start building your real-time payments fraud strategy
Tags : 
real-time payment, p2p payment

Why Business Rules Are Critical for Retail Success

Published By: FICO     Published Date: Aug 27, 2012
Learn how successful retail organizations such as Coca Cola and Dell are using business rules management for marketing and merchandising operations programs to achieve customer centricity.
Tags : 
customer centric marketing, business rulse management, fico, customer insights, customer actions, individualized marketing, analytical applications, business technology

Winning Strategies for Telecom Customer Management

Published By: FICO     Published Date: May 11, 2017
Today it's easy for customers to leave, and they have fewer reasons to stay. In saturated telecom markets, competitors offer similarly high levels of coverage and service. Years of price-based competition have left little room for differentiation and margins are stretched thin.
Tags : 
customer management, finance, finance management, risk, customer relationship management, customer satisfaction, customer service, infrastructure

Zscaler Cloud Security Insights : an analysis of SSL/TLS Based Threats

Published By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 

Zscaler Cloud Security Insights : an analysis of SSL/TLS Based Threats (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
Start   Previous    1 2 3 4 5 6     Next   End

Add Research

Get your company's research in the hands of targeted business professionals.