target

Results 1001 - 1025 of 1055Sort Results By: Published Date | Title | Company Name
Published By: Dun & Bradstreet     Published Date: Feb 03, 2016
Better customer data management increases marketing ROI.” Easy to say, but not so easy to prove. This whitepaper provides everything you need to build a business case for customer data management, including: What organizational data maturity is and how it benefits the business Actual performance outcomes of data-mature organizations Data maturity’s quantifiable impact on targeting, nurturing and close
Tags : 
    
Dun & Bradstreet
Published By: Dell     Published Date: May 03, 2016
Data security presents a series of moving targets that most IT organizations can’t manage.
Tags : 
    
Dell
Published By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : 
retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting, emerging marketing, customer experience/engagement, marketing research, e-commerce
    
AdRoll
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Maxaudience     Published Date: Oct 12, 2015
Over the last 12 years, a massive amount of material has been written about Search Engine Optimization (SEO). The majority of the information is acceptable, but there’s a lot of dated information still being promoted as best practices (exact match domain names, keyword density targets, exact anchor text, and so on). In this eBook, you’ll learn the current best practices in SEO that companies of all sizes can use to increase site visibility and the number of visitors coming to your site, and most importantly, improve conversion rates.
Tags : 
seo, domain names, keyword density targets, exact anchor text, site visibility, number of visitors, conversion rates, search engine optimization (seo)
    
Maxaudience
Published By: Blue Valley Telemarketing     Published Date: Sep 12, 2016
Download this eBook to learn how Telemarketing is perfectly paired with other forms of distribution to proactively assure that your content reaches your target audience at the right time and is of value to recipients.
Tags : 
telemarketing, lead generation, sales pipeline, social media, content management, content management systems, social media marketing, lead generation & automation, sales
    
Blue Valley Telemarketing
Published By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: Jul 15, 2016
In this study commissioned by IBM, Forrester Consulting evaluates the changing security threats enterprises face today, as well as the evaluation and adoption trends regarding IPS as a result.
Tags : 
forrester, ibm, security, consulting, access security, best practices, technology
    
IBM
Published By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
Published By: LogRhythm     Published Date: Jun 19, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
siem, gartner, magic, quadrant, analytics
    
LogRhythm
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Today’s threats are more sophisticated than ever before. All types of organizations and information are being targeted. Attackers exploit vulnerabilities in software and use malware to further their attack objectives.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: IBM     Published Date: Apr 18, 2017
There are myriad software products, from complete CRM platforms that offer analytics to standalone or add-on software products that focus solely on analytics. There are analytics apps that can be added to your existing CRM platform. Or there’s the option to outsource analytics to a growing number of service providers. “The technologies are changing rapidly. There are a zillion startups offering either new tools or technologies, so it is kind of hard to navigate,”Mike Gualtieri, an analystfor Forrester Research Inc. in Cambridge, Mass., said in a recent webcast on analytics. “There isn’t just one platform that you’re going to need. There’s a whole ecosystem of platforms.” Having the right people on staff who know how to use the technology is equally important, analysts say. Analytics aren’t just for statisticians anymore—they’re used by sales, marketing and customer service teams in daily decision making.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
Companies in all industries can benefit from a master data management program, advises MDM expert Anne Marie Smith. Learn how to enhance yours.
Tags : 
data analytics, product refinement, business exploration, advanced prototyping, analytics, data preparation, customer support, sales relations, market research, model management
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Solutions that make it easy to keep track of security and software updates will give you an edge like no other. In many cases, hackers target specific holes in outdated software. Rather than dealing with the headache of continually updating each computer in your network, use tools that track and perform system updates automatically. You’ll always be ahead of the curve.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.