sif

Results 101 - 125 of 173Sort Results By: Published Date | Title | Company Name
By: Sift     Published Date: Jul 12, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
     Sift
By: Sift     Published Date: Jul 12, 2019
"You’re fighting fraud, but how well are you doing? Accurate and comprehensive measurement is integral to understanding your business’ health, yet many companies are not tracking fraud and team performance as effectively as they should. READ THIS GUIDE TO FIND OUT: The most important fraud-related KPIs to track How to share key reports across your organization How the right insights can power your competitive advantage "
Tags : 
     Sift
By: Sift     Published Date: Jul 12, 2019
"What trends should you be following for the next 6 months? We’ve pored over the data, sorted through the news, and interviewed experts and (former) fraudsters. Whether you’re planning for the next month, quarter, or year, this ebook can be your guide. READ THIS GUIDE TO FIND OUT: How fraudsters are using technology against us Whether cryptocurrencies are driving fraud or helping to stop it What GDPR tells us about the future of regulation Why content abuse is getting harder to fight How businesses balance user experience with protecting user data "
Tags : 
     Sift
By: Sift     Published Date: Jul 12, 2019
"As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach "
Tags : 
     Sift
By: Sift     Published Date: Jul 15, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now "
Tags : 
     Sift
By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : analytics, security, problem solving, creative, data, researching, malware
     McAfee EMEA
By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
     McAfee EMEA
By: Genesys     Published Date: May 14, 2009
Customer loyalty is a two-way street. Businesses around the world are finding greater success at winning, serving and retaining customers when they are able to respond quickly and effectively whenever they call. Intelligent Customer Front Door (iCFD) is a metaphor that describes a set of applications and technological resources that enable businesses to identify callers and quickly aggregate information about them to assist in successfully resolving their needs. Learn more today!
Tags : genesys, opus, customer loyalty, customer, crm, customer relationship management, retention, intelligent customer front door
     Genesys
By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract
     SRC,LLC
By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : data protection, code 42, data security, intellectual property
     Code42
By: IBM Corporation     Published Date: Apr 26, 2010
Register now to access a Smart Archive Strategy Library of assets that will help you make a case for the unified collection and classification of content and data.
Tags : ibm filenet, mail archiving, sharepoint archiving, file share archiving, backup and recovery, smart archive, information management, storage management
     IBM Corporation
By: NetProspex     Published Date: May 12, 2014
Only 8% of marketers classified their lead gen efforts as "very successful". Check ot the latest research on what successful lead generation will look like in 2014. See how you compare by taking the survey and then downloading the report!
Tags : marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
     NetProspex
By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
     Paycor
By: CEB     Published Date: Nov 09, 2015
As an HR professional, you know the spotlight is on recruitment functions to prove their value to the business. You’ve seen how the volume of job applications has risen over the last few years, yet all it has done is create more work and rarely better outcomes – for candidates, recruiters or employers. Based on CEB research, this eBook uncovers the insights and solutions to overcome these volume recruitment challenges: • How to create an effective employer brand • How to optimize the candidate experience • How to make the recruitment process more efficient
Tags : recruitment, recruiting, volume recruitment, volume hire, volume recruiting, high volume recruitment, high volume recruiting, applicant sifting
     CEB
By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
     CrowdStrike
By: Zebra Technologies     Published Date: Mar 19, 2019
KEEP YOUR TEAMS MOVING AND PATIENTS SAFER More and more patients are turning to Ambulatory Surgery Centers (ASC) for outpatient surgeries, diagnostic testing and preventive procedures. Case volumes continue to rise and competition for patients is intensifying. At the same time, reimbursement rates are declining. How are ASCs thriving in this rapidly-changing climate? By incorporating sophisticated data capture solutions throughout the patient journey, ASCs are enhancing patient safety, improving clinical work flows and reducing overall costs.
Tags : 
     Zebra Technologies
By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
     AI Business
By: Eloqua     Published Date: Sep 28, 2011
As market competition intensifies and company growth expectations increase, marketers are pressured to deliver measurable results and demonstrate the value they provide. Learn about new tools successful marketers are using to reach the right people through the right channels with the right message.
Tags : marketing white paper, b2b marketing, integrated demand generation, marketing analytics, marketing automation, marketing roi, demand generation platform
     Eloqua
By: IBM     Published Date: Feb 18, 2009
The basic principles for managing an archiving project presented in this paper can help you initiate and plan an archiving strategy that meets your organization’s requirements.
Tags : ibm integrated data management, peoplesoft, business critical erp applications, daily operations, database archiving, data growth, archiving project, data classification
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
     IBM
By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
     Qualys
By: McAfee     Published Date: Nov 12, 2014
This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.
Tags : data loss prevention, dlp, healthcare, dlp best practices, data management
     McAfee
By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : code42, data protection, payment data, data protection, corporate data security, security, it management, knowledge management
     Code42
Start   Previous    1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com