Intent DataCloud: Now with 750+ Intent Topics
Download a detailed list of our current B2B intent data topics:
All Intent Topics – Downloadable Excel File (.xlsx)
Intent Data Analytics
Alphabetical list of Intent DataCloud’s B2B intent data topics:
.NET CMS Platforms
3D Printers
3D Printing Technology
Access Lifecycle Management (ALM)
Access Management Solutions
Account Based Experiences (ABX)
Account Based Marketing (ABM)
Accounts Payable Automation
Accounts Receivable Automation
Actionable Insights
Active Directory Integration
Additive Solutions
Advanced Email Security
Advanced Threat Analytics (ATA)
Advisory Services
Agile Integration
Agile Transformation
AI Software
AI-Assisted Underwriting Technology
AI-Powered Revenue Management
Amazon Web Services (AWS)
Antivirus Solutions
Apache Hadoop
Apache HBase
API Management Solutions
API Technology Platforms
Application Availability
Application Development
Application Integration
Application Lifecycle
Application Modernization
Application Performance Monitoring (APM)
Application Security
Application Service Provider (ASP)
Application Services
Applied Insights
Applied Intelligence Solutions
Appointment Management
Artificial intelligence (AI)
Artificial intelligence (AI) Ethics
Artificial intelligence (AI) for Customers
ASPICE Compliance
Asset Management Solutions
Asset Tracking Solutions
AtHoc
ATT&CK
Attack Detection
Attack Protection
Audience Activation
Audience Behavior Analysis
Augmented Reality (AR)
Automated SOC
Autonomous Data Warehouse
Autonomous Transaction Processing
AWS Cloud
Azure Active Directory
B2B Ecommerce
B2B Technology
Backup & Recovery
Behavioral Economics
Behavioral-Based Email Automation
Big Data
Big Data Analytics
Big Data Appliance
Big Data-as-a-Service (BDaaS)
Blockchain Platforms
Blockchain Solutions
Blueprint Software
Botnet Attacks
Bring Your Own Device (BYOD)
Budgeting & Forecasting Solutions
Business Analytics
Business Communications
Business Continuity
Business Enablement
Business Intelligence (BI)
Business Internet Services
Business Management Software
Business Phone Systems
Business Planning Solutions
Business Process as a Service (BPaaS)
Business Process Automation (BPA)
Business Process Management (BPM)
Business Process Outsourcing (BPO)
Business Transformation
Call Center Outsourcing
Call Center Solutions
Campaign Optimization
Case Management
Catalog Solution
CECL Implementation
Change Management
Chat Support Solutions
Chatbot Solutions
Chronic Disease Management
Clinical Management
Cloud Analytics
Cloud App Security
Cloud Applications
Cloud Backup & Recovery
Cloud Communications
Cloud Communications Solutions
Cloud Computing
Cloud Contact Center
Cloud Contact Center Technology
Cloud Cost Management
Cloud Data Center
Cloud Data Infrastructure
Cloud Data Management
Cloud Data Protection
Cloud Database Platforms
Cloud Delivery
Cloud Economics
Cloud Email Security
Cloud ERP
Cloud Fax Services
Cloud Identity & Access Management (Cloud IAM)
Cloud Infrastructure
Cloud Management Platform
Cloud Migration
Cloud Native Applications
Cloud Native Architecture
Cloud PaaS Services
Cloud Planning Solutions
Cloud Platform
Cloud Provisioning
Cloud Resiliency
Cloud Security
Cloud Security Compliance
Cloud Services
Cloud Storage
Cloud Strategy
Cloud Telephony
Cloud Transformation
Cloud VoIP
Cloud VoIP Solutions
Cloud Workloads
Cloud-Based MFA Solutions
Cloud-Based Personal Attacks
Cloud-Managed Switches
Cloud-Native Application Development
Cloud-Native Applications
Cloud-Ready Data Protection
Cloud-to-Cloud IoT Interoperability
Cluster Servers
Cognitive Automation
Cognitive Manufacturing
Cognitive Process Transformation
Cognitive Security Solutions
Cognitive Service Management
Collaboration Solutions
Collaborative Education
Collaborative Learning
Collaborative Working Environments (CWE)
Colocation
Communications Governance
Communications Platforms
Compliance Management
Computational Fluid Dynamic (CFD)
Computer Hacking
Computer-Aided Design (CAD)
Configure Price Quote (CPQ) Solutions
Constant Bit Rate (CBR)
Construction Management Software
Construction Technology
Contact Center Analytics
Contact Center Outsourcing
Contact Center Solutions
Contact Center Transformation
Container Security
Container Storage
Containerized Applications
Content AI
Content Collaboration
Content Delivery Network (CDN)
Content Intelligence Platforms
Content Management System (CMS)
Content Optimization
Continuous Modeling
Continuous Performance Management
Converged Infrastructure Services
Conversational AI
Conversion Rate Optimization
Corporate Governance
Credit Loss Allowance Estimation
Crisis Communication
Critical Event Management
Cryptomining Threat Protection
Current Expected Credit Loss (CECL)
Customer Base Marketing
Customer Engagement
Customer Experience
Customer Experience Platform
Customer Experience Transformation
Customer Feedback
Customer Insights
Customer Intelligence
Customer Interaction Management
Customer Interactions
Customer Review Automation
Customer Support
CX Management Solutions
Cyber Threats
Cybersecurity
Cybersecurity Response
Data Analytics (DA)
Data Analytics Platform
Data Analytics-as-a-Service (DAaaS)
Data Archiving
Data Availability Services
Data Breach Prevention
Data Breach Response
Data Breach Security
Data Center
Data Center Automation
Data Center Consolidation
Data Center Infrastructure Management (DCIM)
Data Center Management
Data Center Migration
Data Center Monitoring
Data Center Optimization
Data Classification
Data Compliance
Data Consolidation
Data Containers
Data Deduplication
Data Driven Insights
Data Governance
Data Growth Analytics
Data Infrastructure
Data Leak Prevention
Data Loss Prevention
Data Management
Data Management for Healthcare
Data Migration
Data Mining
Data Operations
Data Privacy
Data Privacy Solutions
Data Protection
Data Protection Appliances (IDPA)
Data Protection Mandates
Data Replication
Data Science
Data Security
Data Storage
Data Storage Optimization Analytics
Data Theft
Data Transformation
Data Vaulting
Data Warehouse Solutions
Database as a Service (DBaaS)
Database Cloud Services
Database Conversion
Database Lifecycle Management (LCM)
Database Management
Database Migration
Database Platforms
Database Provisioning Tools
Database Security
Database Server Management
DataOps
DDoS Attack Prevention
DDoS Attacks
DDoS Mitigation Management
DDoS Protection
Deep Deployments
Development Platforms
DevOps
DevSecOps
Digital Business Planning Solution
Digital Commerce Solutions
Digital Experience Optimization
Digital Immune System
Digital Modernization
Digital Process Automation
Digital Transformation (DX)
Direct Internet Access (DIA)
Disaster Recovery
Disaster Recovery as a Service (DRaaS)
Distributed Analytics
Distributed Denial-of-Service (DDoS)
DNS Related Attacks
Document Automation
Document Cloud Apps
Document Communications Platform
Document Management Solutions
Document Review Software
Domain Fronting
Dossier Management
Ecommerce Platforms
Ecommerce Solutions
Edge-Computing
eDiscovery Software
Education Cybersecurity
Education Technology
Email Analytics
Email Marketing Solutions
Email Security
Embedded Hardware Attacks
Employee Engagement
Employee Experience
Employee Lifecycle Management
Employee Performance Management
Employee Recognition
End User Protection
Endpoint Encryption
Endpoint Management
Endpoint Protection
Endpoint Security
End-to-End Services
End-User Security
Energy Automation Solutions
Energy Management Solutions
Engineering Lifecycle Management
Enterprise Access Management (EAM)
Enterprise AI Infrastructure
Enterprise Application Acceleration
Enterprise Application Development
Enterprise Application Performance
Enterprise Applications
Enterprise Asset Management
Enterprise Backup Software
Enterprise Chatbots
Enterprise Communications Solutions
Enterprise Cybersecurity
Enterprise Data Management
Enterprise Data Protection
Enterprise Data Security
Enterprise Feedback Management Platforms
Enterprise File Security
Enterprise File Synchronization & Sharing (EFSS)
Enterprise Information Archiving
Enterprise Integration
Enterprise Mobility
Enterprise of Things (EoT)
Enterprise Performance Management (EPM)
Enterprise Resource Planning (ERP)
Enterprise Security
Enterprise Software
Enterprise Systems Management
Ethernet Network Provider
Ethernet Network Providers
Ethernet Network Services
Executive Information Systems (EIS)
Expense Management
Experimentation Platforms
Facilities Management
Fiber Connected Buildings
Fiber Connectivity Solutions
Fiber Infrastructure Solutions
Fiber Internet Solutions
Fiber Optic Internet
Field Service Management
File Servers
File System Optimization
Finance Cybersecurity
Financial Accounting Services
Financial Benchmarking
Financial Managed Services
Financial Management Software
Financial Performance Management
Financial Planning Services
Financial Planning Software
Financial Service Providers
Financial Technology
FINRA Compliance
FinTech Ecosystem
FinTech Platforms
Flash Storage
Flash-Optimized Storage
Flexible Workplace Solutions
Freelance Development Services
Freelance Mobile Development
Freelance Technical Writing
Freelancing Platforms
Fused Deposition Modeling (FDM)
General Data Protection Regulation (GDPR)
Global Freelancing Platforms
Hardware Infrastructure
Harmonic Balance
HCI Management Software
Health Coaching
Healthcare Cybersecurity
Healthcare Platform
Healthcare Technology
High Density Pods
High-Speed File Transfer
High-Speed File Transport
HIPAA Compliance
Hospitality Revenue Management
Hosted VMware Environments
Hosted VoIP
Hosted VoIP Solutions
HPE Data Management Framework (DMF)
HR Analytics
HR Management Solutions
HR Service Delivery
HR Technology Solutions
Huddle Room Technology
Human Capital Management (HCM)
Human Resources Information Systems (HRIS)
Human Resources Management Systems (HRMS)
Hybrid Cloud Automation
Hybrid Cloud Operations
Hybrid Cloud Platform
Hybrid Cloud Security
Hybrid Cloud Solutions
Hybrid Data Management Platforms
Hybrid Fiber Coaxial (HFC)
Hybrid Flash Storage
Hybrid IT
Hyperconverged Infrastructure (HCI)
IBM Cloud
IBM Cloud Data Center
IBM Cloud for VMware
IBM Maximo
IBM Watson
IBM-Hosted VMware Environment
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance & Administration (IGA)
Immersive Learning
Incentive Compensation Management (ICM)
Incident Management Solutions
Incident Resolution
Incident Response
Industrial Internet of Things (IIoT)
Industrial Transformation (IX)
Information Assurance
Information Governance
Information Protection
Infrastructure Modernization
Infrastructure-as-a-Service (IaaS)
Insight-Driven Engagement
Insurance Platforms
Insurance Technology Solutions
Integrated Business Planning
Integrated Data Protection Appliances (IDPA)
Integrated Workplace Management System (IWMS)
Intelligent Apps
Intelligent Automation
Intelligent Contact Center
Intelligent Enterprise Solutions
Intelligent Spend Management
Intelligent Underwriting
Intelligent WAN
Interactive Patient Care
Interactive Patient Systems
Internal Investigations
Internal IT Support
International Financial Reporting Standard 9 (IFRS 9)
Internet of Things (IoT)
Internet Security
IoT Scalability
IP Telephony Systems
ISO-26262 Compliance
IT Alerting Solutions
IT Asset Management
IT Consultancy Services
IT Consumerization
IT Efficiency Solutions
IT Governance
IT Helpdesk Solutions
IT Infrastructure
IT Managed Services
IT Modernization Solutions
IT Optimization
IT Resilience Platforms
IT Security Solutions
IT Service Management (ITSM)
IT Support Solutions
IT Transformation
Java Development
Java Support
Key Performance Indicator (KPI)
License Compliance Solutions
Linux Containers
Live Chat Engagement
Load Balancing
Log Management
Low Density Data Center
Low-Code Development Platform (LCDP)
LTO Tape Drives
Machine Intelligence
Machine Learning
Malware & Vulnerabilities
Malware Attacks
Malware Detection
Malware Solutions
Malware Threats
Managed Data Services
Managed Detection & Response (MDR)
Managed Security Services
Managed Services
Managed Services Providers (MSP)
Management Infrastructure Attacks
Marketing Analytics
Marketing Automation
Marketing ROI Optimization
Mechanical Design Automation (MDA)
Media Asset Management (MAM)
Medical Imaging
Mobile Construction Management Software
Mobile Device Management (MDM)
Mobile First Commerce
Mobile Marketing Solutions
Mobile Security
Mobility Management
Modern Workloads
Modular Platform
Multi-Cloud Environments
Multicloud Solutions
Multi-Factor Authentication (MFA)
Multivendor Support Services (MVS)
MySQL Database Management
Net Promoter Score
Network Access Control (NAC)
Network Functions Virtualization (NFV)
Network Infrastructure
Network Management
Network Packet Brokers (NPBs)
Network Performance Management
Network Performance Monitoring
Network Security
Network Storage
Network Virtualization
Network Visibility
Next-Generation Hybrid IT
NoSQL Database Management
NPS Software
NVMe Storage
Office 365 Backup
Office 365 Data Protection
Omni-Channel Communications
On-Demand Cloud
Online Fraud Investigation
On-Premise Switches
Open Banking Solutions
Open Office Distractions
Open Office Headsets
Open Source Development
Open Source Management
Open Source Platforms
Open Source Solutions
OpenShift Container Platform
Operational Analytics
Operational Performance
Oracle Multitenant
Order Fulfillment Solutions
Order Management Solutions
Order Optimization Solutions
Organizational Transformation
Partner Relationship Management (PRM)
Patch Management Software
Patient Experience
Pay for Performance
Payroll Software Solutions
PCI Compliance
PDF Editor Software
People Success Platforms
Performance Monitoring Tools
Personalized Learning
Phishing Attacks
Pipeline Generation
Planning & Forecasting
Platform as a Service (PaaS)
Predictive Analytics Platform
Predictive Lead Scoring
Pricing Optimization Software
Pricing Software Solution
Private Branch Exchange (PBX)
Private Cloud Solutions
Product Registration
Productivity Solutions
Professional Services Automation (PSA)
Progressive Web Applications (PWA)
Project Management Solutions (PM)
Public Cloud Solutions
Pure Storage
Quota Management Systems
Random Server Proliferation
Ransomware Protection
Ransomware Solutions
Real-Time Analytics
Real-Time Attack Protection
Real-Time Data Insights
Real-Time Supply Chain Management
Real-Time Traffic Inspection
Regulatory Data Compliance
Remote Access Software
Remote Support Software
Remote Visual Monitoring
Revenue Management System (RMS)
RFID Tracking Solutions
Risk & Compliance
Risk Management
Risk Mitigation
Robotic Process Automation (RPA)
Rural Healthcare Providers
SaaS Management
SaaS Operations Management Software
Sales Acceleration
Sales Compensation Management
Sales Effectiveness Metrics
Sales Effectiveness Training
Sales Enablement
Sales Force Automation (SFA)
Sales Performance Management (SPM)
Sales Productivity
Salesforce Apps
SAP
SAP HANA
SD-WAN Deployment
Secure Collaboration Solution
Secure Internet Gateway (SIG)
Secure WAN Transport
Secure Web Gateways (SWG)
Security & Compliance Solutions
Security Analytics
Security Automation
Security Breach Response
Security Breach Solutions
Security Compliance
Security Hygiene
Security Intelligence
Security Management
Security Model Management
Security Monitoring
Security Operations
Security Operations Center (SOC)
Security Patch Solutions
Security Platforms
Security Resiliency Platforms
Security Standards Council
Security Tools
Security Update Solutions
Self-Service Solutions
Server Automation
Server Environments
Server Software
Service Centralization
Service Level Agreement (SLA)
Service Oriented Architecture (SOA)
Shadow IT
Single Sign-On (SSO)
SMS Protection
SOC 2 Type 2 Certification
SOC2 Compliance
Social Marketing Solutions
Software as a Service (SaaS)
Software Composition Analysis (SCA)
Software Defined Data Centers (SDDCs)
Software Defined Storage (SDS)
Software Development
Software Engineering
Software Modernization
Software Spend Optimization
Software-Defined Data Center
Software-Defined Data Center (SDDC)
Software-Defined Infrastructure (SDI)
Software-Defined Networking (SDN)
Software-Defined Storage (SDS)
Software-Defined Wide Area Network (SD-WAN)
Spear Phishing
Speech Recognition Software
Spyware Solutions
SQL-Based Querying
Statistical Analysis Solutions
Stealth IT
Storage Consolidation
Storage Hardware
Storage Management
Storage Platforms
Storage Solutions
Strategic Spend Management
Structured Data Storage
Student Engagement
Supply Chain Management (SCM)
Systems Storage
Talent Acquisition
Talent Management
Talent Optimization
Tape Backup
Targeted Personal Attacks
Technology Consulting
Technology Spend Optimization
The IoT Economy
Threat Detection
Threat Intelligence
Threat Investigation Platform
Threat Prevention
Threat Protection
Tiered Storage
Time & Attendance
Travel & Expense Management Solutions (T&E)
Travel Management
Two-Factor Authentication (2FA)
Unified Communications (UC)
Unified Communications as a Service (UCaaS)
Unified Endpoint Management (UEM)
Uninterruptible Power Supplies (UPS)
Unstructured Data
Unstructured Data Storage
User Experience (UX)
Value-Added Resellers (VAR)
Variable Bit Rate (VBR)
Video Conferencing Solutions
Video Production Technologies
Virtual Cloud Network
Virtual Data Center
Virtual Data Protection
Virtual Desktop Infrastructure (VDI)
Virtual Infrastructure Management
Virtual Private Cloud Solutions
Virtual Reality (VR)
Virtual Receptionist Solutions
Virtualization
Virtualization Solutions
Virtualization Technology
Visual Effects (VFX)
VMware vRealize
VMware Workload Optimization
Voice over Internet Protocol (VoIP)
VoIP Phone Systems
VoIP Solutions
Vulnerability Response
WAN Infrastructure Optimization
Web Application Security
Web Content Management
Web Optimization
Web Performance
Web Traffic Security
Website Metrics
Wide Area Network (WAN)
Windows Server
Wireless Technology Solutions
Workflow Automation
Workflow Management
Workforce Collaboration
Workforce Compensation Optimization
Workforce Management
Workforce Planning
Workforce Safety Solutions
Workforce Transformation
Workload Automation
Workload Consolidation
Workload Optimization
Workload Performance
Workplace Complacency
Workplace Data Integration
Workplace Management System
Workplace Resource Optimization
Worm Security
Zero Moment Point (ZMP)
Zero Trust Security