target

Results 101 - 125 of 1030Sort Results By: Published Date | Title | Company Name
Published By: Anaplan     Published Date: Nov 27, 2017
"The pressure on sales to meet and exceed ever-increasing revenue targets is higher than ever before. At the heart of this challenge lies a complex analytical and modeling problem that involves data spread across many rigid–and usually disconnected–systems, teams, and geographies. Leading companies handle this problem by focusing first on creating a sales performance plan that is data-driven and tied to business objectives. The research report conducted by Harvard Business Review provides you with how today's sales executives: • Overcome technology weaknesses to uncover sophisticated analytics • Change ingrained, cultural tendances of sales organizations • Adopt dynamic practices to respond to change quicker"
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 29, 2018
As businesses grow more optimistic about opportunities for growth, the pressure is on for sales organizations to meet ever higher revenue targets. In a global survey on sales performance optimization by CSO Insights, 94 percent of respondents said their 2014 revenue targets were higher than last year’s. It’s no wonder that “capture new accounts,” cited by 60 percent of respondents, topped the list of objectives for 2014 in the study. At the same time, many sales reps are struggling to meet even their current quotas. And in an Aberdeen Group survey, nearly half identified insufficient revenue growth as the top pressure motivating them to pursue sales management initiatives ranging from building out the capabilities of sales teams to improving management practices and investing in technology tools.
Tags : 
sales, performance, revenue, optimization, objectives, accounts
    
Anaplan
Published By: Anaplan     Published Date: Apr 02, 2019
49% surveyed cite insufficient revenue growth as the top pressure motivating sales performance management initiatives. And on top of that, 58 percent of sales reps are struggling to meet their current sales quotas. In this winner-takes-all market, sales leadership is faced with an uphill battle in driving sales performance. The pressure on sales to meet and exceed ever-increasing revenue targets is higher than ever before. Download this exclusive report to learn new insights on how sales performance data and analytics are driving peak sales performance.
Tags : 
    
Anaplan
Published By: apperian     Published Date: Apr 13, 2012
Enterprise app stores seem to be a proverbial win/win situation. Businesses win because they don't have to hang out with the unincorporated, if not unwashed, consumer masses. It's a win for the ecosystem of app store providers who suddenly have a much larger and more granular market to target. Read to find out more.
Tags : 
apperian, technology, business technology, enterprise, app store, mobile
    
apperian
Published By: appia     Published Date: Jan 21, 2014
Behind every successful app is a great user acquisition strategy. In our whitepaper, Four Tips for Driving Mobile Advertising Success, learn four essential tactics creating successful mobile advertising program.
Tags : 
appia, mobile marketing, mobile targeting, localization, tracking, app marketing, iphone, blackberry, android, iphone marketing, mobile advertising, mobile target, social media, interactive marketing, web analytics, market research, e-commerce solutions, social media marketing, direct mail/marketing
    
appia
Published By: Aprimo     Published Date: Apr 09, 2012
The key best practices for next best action in CRM are to align it with key business imperatives; deliver it through priority customer-interaction channels; inform targeted offers with trustworthy customer data; drive it from advanced analytics and rules; and use it to shape multichannel conversations with customers.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy, crm solutions/software, customer experience/engagement, business intelligence, market research
    
Aprimo
Published By: Aprimo     Published Date: May 01, 2012
The key best practices for next best action in CRM are to align it with key business imperatives; deliver it through priority customer-interaction channels; inform targeted offers with trustworthy customer data; drive it from advanced analytics and rules; and use it to shape multichannel conversations with customers.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy, crm solutions/software, customer experience/engagement, business intelligence, market research
    
Aprimo
Published By: Arbor     Published Date: Feb 07, 2013
In today’s environment, any enterprise operating online—which means just about any type and size of organization—can become a target because of who they are, what they sell, who they partner with or for any other real or perceived affiliations.
Tags : 
arbor, anti-ddos, ddos attacks, threat
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: Arcot     Published Date: Jun 04, 2008
Man-in-the-Middle attacks can defeat most kinds of multi-factor authentication, including OTP tokens. Financial institutions, brokerages, and other likely targets of MITM attacks should consider the ability of their countermeasures to defeat MITM attacks, as these types of attacks will continue.
Tags : 
authentication, identification, identity, identity theft, arcot, man in the middle, man-in-the-middle, mitm
    
Arcot
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud
    
Arcserve
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud
    
Arcserve
Published By: Arkadin     Published Date: Sep 11, 2013
Financial services institutions focus on innovative services, customer relationships, and cost structures to drive profitable growth. Remote collaboration solutions (audio and web conferencing) are technologies target these three areas by transforming business processes.
Tags : 
financial services, finance, fsi, financial service institutions, regulatory compliance, banking and financial services, financial solutions, capital markets, collaboration, collaboration solutions, arkadin, web collaboration solutions, web collaboration services, conferencing solutions, conferencing services, audio web conferencing
    
Arkadin
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 24, 2019
Join our webinar to hear how Consensus, a Target-owned subsidiary, utilizes AWS and Trifacta to prepare data for use in fraud detection algorithms. You’ll learn how self-service automated data wrangling can save your organization time and money, and tips for getting started with Trifacta’s solution, built for AWS. Webinar attendees will learn: Why automating your data wrangling tasks can lead to greater data accuracy and more meaningful insights. How you can reduce your data preparation time by 60% and more with self-service data wrangling tools built for AWS. How easy it is to get started with machine learning solutions for data wrangling on the cloud.
Tags : 
    
AWS
Published By: B Channels     Published Date: May 01, 2018
All technology companies are continuing their investment in IoT technologies: targeting technology verticals or market segments like Smart Homes or IIoT. They all need partners and alliances to expand in these verticalized markets. This post looks at who, where and the implications of IoT expansion.
Tags : 
    
B Channels
Published By: Bazaarvoice     Published Date: Sep 21, 2016
The challenge for brands and retailers is clear. To win during the holiday shopping season, they must: • Plan holiday campaigns leveraging the very best data resources you can to inform messaging and targeting • Use the fragmented holiday shopping journey to their advantage – meeting shoppers in the moments that matter • Cut through the noise on Black Friday – and throughout holiday – to reach consumers with relevant, authentic messages that resonate
Tags : 
black friday, holiday shopping, holiday campaigns, customer messaging, customer targeting, holiday messaging strategy
    
Bazaarvoice
Published By: Beyond.com     Published Date: Nov 28, 2011
Learn how a smart niche recruitment strategy can effectively and affordably target the right candidates, and significantly reduce your cost per hire.
Tags : 
niche recruitment, recruiting, recruitment, hire, hiring practices, qualified candidates, talent acquisition, talent sourcing, targeting, budget, strategy, applicant pool, career website, career network, online recruiting, hr professionals
    
Beyond.com
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: Bit9     Published Date: Mar 07, 2013
Download Bit9’s latest Threat Advisor and see how a trust-based security platform can help you protect your core IP.
Tags : 
security, risk management, cyber threats, security breaches, cyber espionage, nsa, intellectual property
    
Bit9
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.