online transactions

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
Published By: Riskified     Published Date: Aug 06, 2019
For online retailers, CNP fraud is a serious problem that will only get larger as the eCommerce market continues to grow. According to a recent report by Juniper Research, the cost of fraudulent eCommerce transactions is projected to rapidly increase over the next 5 years, reaching approximately $71 billion by 2022
Tags : 
    
Riskified
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : 
sca, online economy, online payment
    
Stripe
Published By: Intel     Published Date: Dec 13, 2018
Technology plays a key role in online shopping, where online retailers gain a greater understanding of their customers through data from their browsing and purchasing habits. Today, when consumers shop in brick-and-mortar stores, they expect the same personalized and responsive service. To help retailers achieve this level of service, a combination of hardware and software—Intel® Vision Accelerator Design products, cameras, AI deep learning video analysis technology— do the work for you. Uncover how Advantech system uses the Intel Vision Accelerator Design with Intel Movidius VPU to drive • Overall store performance such as the number of visitors and transactions, point-of-sale data, sales per shopper and the store’s ranking, and can distinguish traffic patterns by weather and time of day • Traffic and sales analysis for better staff allocation and marketing-event planning • Store heatmap analysis for more precise merchandise placement and product promotion
Tags : 
    
Intel
Published By: HERE Technologies     Published Date: Dec 06, 2018
adsquare offers brands insights into customer behaviors and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: DocuSign UK     Published Date: Nov 06, 2018
"In today’s intensely competitive marketplace, the business world is moving rapidly to online transactions from inefficient, costly, paper-based processes. Furthermore, consumers expect to be able to interact digitally anytime, anyplace, so providing easily accessible digital touchpoints is also critical to successfully keeping and retaining your customers. No matter the size or type of business you’re in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that. Read the report to learn how leading companies across industries are improving critical business processes using eSignatures to achieve: - Greater customer satisfaction - Higher close rates and productivity - Lower costs, greater efficiency - Improved time to revenue - Compliance and security-risk mitigation"
Tags : 
    
DocuSign UK
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks – and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS
Published By: HERE Technologies     Published Date: Sep 26, 2018
Adsquare offers brands insights into customer behaviours and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, Adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places. and why customers make transactions in specific places.
Tags : 
    
HERE Technologies
Published By: SundaySky     Published Date: Mar 06, 2018
A Fortune 500 home improvement retailer turned to personalized video advertising in support of its companywide commitment to drive online transactions and revenue. By combining personalization with the alreadyengaging video medium, the top 10 Internet retailer aimed to provide a captivating ad experience that would differentiate the brand in a fiercely competitive market and drive online sales. The brand had already committed to engaging consumers on a 1-to-1 basis across all channels, and as such, partnered with SundaySky to extend this approach to its video advertising.
Tags : 
    
SundaySky
Published By: Vindicia     Published Date: Oct 04, 2017
The number of services available via online subscription is exploding—and the big bang of subscription is only gaining momentum. Companies want to turn one-time purchases into regularly recurring subscriptions or memberships. The siren song of subscription success is calling to executives in virtually every industry. Business leaders want ongoing revenue streams from an army of subscribers. But, as companies that plunged into recurring business models are realizing, subscriptions are more than just transactions that recur. Subscription success can be illusive. Too often, subscription models don’t generate the expected high, ongoing revenue streams.
Tags : 
    
Vindicia
Published By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : 
akamai, akamai gaming, infrastructure, distribution channel, technological advancements
    
Akamai Technologies
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Telerik     Published Date: May 31, 2016
Digital Business Transformation (DBT) is a focus of organizations ranging from small, non-profit associations to multi-billion dollar healthcare systems. The primary areas of DBT include moving from brick and mortar to online transactions, automation over human interactions and gaining immediate insight into activities to drive instant and constant improvement. At the forefront of DBT is Digital Marketing. Marketing’s primary job of gaining mindshare and communicating the right messages along each customer’s individual journey— from prospect to repeat buyer and brand advocate— lends itself to the digital medium. Marketing’s mission of continuous customer engagement depends on the ability to change strategies and tactics as needed.
Tags : 
telerik, marketing, digital marketing, technology platform
    
Telerik
Published By: IBM     Published Date: May 02, 2016
A good customer experience drives positive word-of-mouth advertising—while a bad one can harm your brand. That's why it's so critical to quickly take steps to understand the experience of customers who are transacting online.
Tags : 
ibm, conversion, adoption, customer experience, online transactions, word of mouth, brand
    
IBM
Published By: Dell EMC     Published Date: Oct 08, 2015
To compete in this new multi-channel environment, we’ve seen in this guide how retailers have to adopt new and innovative strategies to attract and retain customers. Big data technologies, specifically Hadoop, enable retailers to connect with customers through multiple channels at an entirely new level by harnessing the vast volumes of new data available today. Hadoop helps retailers store, transform, integrate and analyze a wide variety of online and offline customer data—POS transactions, e-commerce transactions, clickstream data, email, social media, sensor data and call center records—all in one central repository.
Tags : 
    
Dell EMC
Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure
    
CA Technologies
Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores common challenges facing E-commerce platform and B2C website managers planning for the holiday shopping rush and bolstering services to meet customer demands.
Tags : 
ecommerce, quality of service, retail economy, application performance, commercialization, online payments, electronic transactions
    
VMTurbo
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent
    
Symantec
Published By: HP     Published Date: Jan 20, 2015
There are many new ways Big Data analytics can significantly boost marketing and promotional efforts through real-time and historical analysis of online data, such as clickstream or purchase transactions. Unstructured data based on social media—even photos and video—offers enormous potential when analyzed with the right tools.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: Thawte     Published Date: Oct 06, 2014
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl certificates, application, web server, sensitive information, customer confidence
    
Thawte
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Previous   1 2    Next    
Search Resource Library