personal data management

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data
    
Mindfire
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: CA Technologies     Published Date: Sep 13, 2017
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms. Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation. In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about: •Th
Tags : 
    
CA Technologies
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Wholly relevant and personalized customer service is no longer an optional preference, so much as an inevitable reality. Through the right data management technology, marketers can pave the way for their customers to reach the right ticket for their chosen journey, through the channels they prefer, in a way which means something to them in that particular moment. Airlines don’t have to make use of beacon technology and IoT to begin uplifting their outreach, but should choose a solution which is ready as soon as they are, to plug into, embrace and deliver actions with a shifting landscape of consumer touchpoints.
Tags : 
customer, marketers, technology, management
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: SessionM     Published Date: Jan 24, 2018
Learn the best strategies to stand out from your competition and increase purchase frequency, recency, spend and customer lifetime value.
Tags : 
customer engagement, unified customer profile, customer data platform, data orchestration, customer data activation, machine learning, data integration, personalization
    
SessionM
Published By: SessionM     Published Date: Jan 24, 2018
Download Gartner’s latest Market Guide for Master Data Management of Customer Data Solutions to learn market definition, analysis and recommendations, the criteria necessary for evaluating marketing data management solutions and how master data sits in the middle of the 360° customer view.
Tags : 
customer engagement, unified customer profile, customer data platform, data orchestration, customer data activation, machine learning, data integration, personalization
    
SessionM
Published By: Adobe     Published Date: Jun 26, 2019
To achieve personalization at scale, brands need to develop a better understanding of each customer they interact with, and that’s all about combining all the data they collect from every available source into a single cohesive customer view. There is no way they can handle this task or manage all this data manually, which is why data management platforms (DMPs) rose to prominence. Today, companies are looking to build on this single customer view with a real-time understanding of their audience across every digital channel, marking the next phase on the maturity ramp for DMPs.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
In the race to please customers and beat out the competition, there’s been a lot of talk about customer data platforms (CDPs). For marketers, a CDP is just what they’ve been looking for — a more comprehensive approach to unified customer data that lets you include raw personally identifiable information or sensitive data in your data pool. But while IT teams see the ultimate value, they may question the idea introducing a new point solution that complicates their tech stack even more. The days of brute forcing customer experience with new technology are over. Today, IT teams need to make decisions about customer experience management that span the business and go beyond marketing. That requires a different approach to the customer data problem. To learn more about our solution to the customer data platform, read our article Real-time CPD. Real-time customer experience.
Tags : 
    
Adobe
Published By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
    
Veeam '18
Published By: Adobe     Published Date: Sep 23, 2019
To achieve personalization at scale, brands need to develop a better understanding of each customer they interact with, and that’s all about combining all the data they collect from every available source into a single cohesive customer view. There is no way they can handle this task or manage all this data manually, which is why data management platforms (DMPs) rose to prominence. Today, companies are looking to build on this single customer view with a real-time understanding of their audience across every digital channel, marking the next phase on the maturity ramp for DMPs.
Tags : 
    
Adobe
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: Datamatics     Published Date: Mar 02, 2011
Are you looking for a time and attendance system which maximizes workforce productivity while minimizing compliance risk? Sign up today and receive a no-obligation personalized demo from Datamatics, leaders in labor management automation since 1966.
Tags : 
datamatics, time, attendance, payroll costs, risk, compliance
    
Datamatics
Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service
    
IBM
Published By: IBM     Published Date: Jul 13, 2015
This ebook explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions.
Tags : 
customer centric organizations, crm, customer usability, personalized interactions, big data, data quality, data management
    
IBM
Published By: Tippit, CRM     Published Date: May 15, 2009
Today's Customer Relationship Management (CRM) solutions aim to recapture the personalized customer service provided by local mom-and-pop shops of yore – except with high-tech-analytics capabilities, collaborative platforms and automated processes. By gathering information from multiple data sources and storing it in a centralized location, a hosted CRM solution provides a holistic view of a customer in real time. Armed with this insight, a company’s management, sales and service people can better generate leads, target top customers, manage marketing campaigns, drive sales and boost customer satisfaction.
Tags : 
tippit, marketing, analytics, sales force automation, crm, onyx software, rightnow technologies, enterprise applications
    
Tippit, CRM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee