target

Results 351 - 375 of 1007Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: Gleanster Research     Published Date: Oct 22, 2013
This Deep Dive from Gleanster research will explore why some marketing technologies may not be the best solution for distributed marketers and how an merging class of technology called “local marketing automation” is enabling corporate marketing to oversee brand consistency and simultaneously give local marketers autonomy and control over communications to their local target audiences.
Tags : 
    
Gleanster Research
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture, siem, security event management
    
Intel Security
Published By: GrowthIntel - INT     Published Date: Jul 06, 2017
For many B2B companies, the best way to generate new business is the old fashioned one – a team of telemarketers hitting the phones to make sales appointments for their more experienced colleagues. But they are losing money every time a telemarketing agent calls somebody that doesn’t want to buy from them. This ebook will explain: • Why you could be wasting 97.6% of your time • The root of telemarketing’s targeting problem • A better way to classify companies; and • A smarter way to go to market
Tags : 
b2b, intel, telemarketing, targeting, conversation, reduce costs, business performance, sales, data efficiency
    
GrowthIntel - INT
Published By: Eloqua     Published Date: Jan 13, 2012
This white paper examines 5 key elements of developing an integrated sales and marketing funnel, and provides examples of how marketing departments can drive qualified sales opportunities and revenue.
Tags : 
sales funnel, targeted marketing, marketing white paper, revenue creation, lead management, revenue engine, funnel economics, lead conversion, qualified leads, dynamic content, identifying qualified opportunities, business intelligence, market research, lead generation & automation, sales
    
Eloqua
Published By: Eloqua     Published Date: Jan 13, 2012
B2B purchasing in a Web 2.0 world has become an interactive process driven by customers. Learn how using clickstream data to target buyers' motivations allows marketers to trigger automated processes like lead scoring and nurturing to drive better leads for sales.
Tags : 
digital body language, sales lead management, lead management system, lead nurturing, b2b social media, b2b software marketing, marketing white paper, lead generation, business to business advertising, social media optimization, b2b lead generation, lead scoring, customer experience/engagement, social media marketing, data management/analytics, lead generation & automation
    
Eloqua
Published By: Eloqua     Published Date: Jan 13, 2012
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting, customer experience/engagement, business intelligence, market research, email marketing services/software, sales
    
Eloqua
Published By: E.ON     Published Date: Nov 21, 2018
The government has made it clear that it sees electric vehicles as the main way of reducing carbon emissions from road transport and improving air quality. The Road to Zero strategy states that the UK government wants 'one of the best electric vehicle infrastructure networks in the world' and unveiled targets for at least fifty per cent of new car sales to be ultra low emission by 2030, and forty per cent of new vans. See how E.ON can help your business get ahead of the game by downloading this whitepaper today!
Tags : 
    
E.ON
Published By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing
    
Websense
Published By: Silverpop     Published Date: Sep 19, 2011
New innovations in marketing automation now enable savvy, self-sufficient marketers to easily develop more comprehensive lead-scoring models that, along with Web tracking, behavioral targeting and careful segmentation, can lead to more sophisticated nurturing programs that better educate and engage prospects and increase your chances of making a sale.
Tags : 
silverpop, marketing, behavioral targeting, segmentation, social media, interactive marketing, web analytics, market research, social media marketing
    
Silverpop
Published By: F5 Networks Inc     Published Date: Aug 15, 2013
Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5’s new full proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.
Tags : 
domain name system, dns, infrastructure, global, local, cloud load balancing, dns systems, dns infrastructure, mobile devices, security, cloud load balancing, dns solutions, data center
    
F5 Networks Inc
Published By: SAP Inc.     Published Date: Jun 16, 2009
This white paper presents IDC’s framework for implementing operational excellence (op ex) and helps the reader move toward an effective op ex implementation while avoiding potential pitfalls.
Tags : 
sap, operational excellence, op ex, internal assessment, competitive benchmarking, resource prioritization
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Data quality is an elusive subject that can defy measurement and yet be critical enough to derail any single IT project, strategic initiative, or even a company as a whole.
Tags : 
roi, data quality, sap, return-on-investment, crm, erp, enterprise resource management, customer relationship management, crm, business intelligence, referential integrity, sql, data quality scoring, target marketing
    
SAP Inc.
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
Organizations face many challenges when creating a constellation of global Web sites. They need to maintain brand consistency while allowing for variations that reflect local culture. Creating truly localized Web sites can be a daunting process, in which corporate and local marketing teams need to work together to provide relevant information to many different target audiences.
Tags : 
sdl tridion, a/b, crm, ecm, blueprinting, flysn, wcm, dam, wcm, web content management, multisite functionality, content management systems
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jul 06, 2010
In today's connected world, a well managed Web presence is essential for any organization to achieve business success. The internet provides unprecedented opportunities for border-free communication. Many organizations use the internet to reach worldwide audiences. These organizations need to balance centralized messages and branding with localized content and contributions. SDL Tridion's BluePrinting technology allows you to create this balance.
Tags : 
sdl tridion, blueprinting, communication, localization, multidimensional communication, content management systems
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : 
sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy, analytics, content management systems, interactive marketing, web analytics, crm solutions/software, data management/analytics
    
SDL Web Content Management Solutions
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.