re targeting

Results 1 - 25 of 170Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptocurrency’s market volatility could make it much more lucrative than ransomware. Find out who they’re targeting and how to protect your network.
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: May 16, 2019
Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
data, applications, analytics, algorithms, innovation, cloud, technology, customer, banking
    
TIBCO Software
Published By: Intel     Published Date: Apr 16, 2019
Gartner predicts that the public cloud market will surpass USD 300 billion by 2021 . With the big players (Amazon, Google, Microsoft and IBM) taking home 63 percent of the market share , how will next wave CSPs stand out from the crowd? Download Intel's latest whitepaper, Differentiating for Success: A Guide for Cloud Service Providers' to discover how to offer unique services, including: - Providing workload-specific optimizations, for example machine learning or high-performance computing - Targeting a particular geographical area - Focusing on an industry, such as financial services - Delivering emerging technology, such as virtual reality, in-memory databases, and containerization
Tags : 
    
Intel
Published By: HERE Technologies     Published Date: Apr 04, 2019
Artificial Intelligence (AI) has already begun to improve targeting, segmentation, media buying and planning in the advertising industry. AI algorithms can extract complex patterns from vast numbers of data points, and in so doing, are able to self-correct and learn patterns. The revenue potential that improved personalization, segmentation and targeting that AI provides to marketers is huge. At HERE Technologies, we are placing AI and machine learning at the center of our products and services. We see the opportunity in automated machine learning to enrich the targeting and effectiveness of mobile advertising campaigns in real time. But the outcome of implementing such technology depends on the quality of data being fed into it from the outset. AI wouldn’t be as helpful if it’s being used alongside questionable location data or audience data. HERE’s location data provides a strong thread that can be woven throughout every stage of the media buying process, offering more context and
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Darktrace     Published Date: Apr 02, 2019
As organizations increasingly rely on cloud services and SaaS applications to streamline business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migrations continue apace, the unique security challenges presented by the cloud will not only require a more agile mindset, but also self-learning technologies that can move at the speed of cloud deployments and spot subtle deviations indicative of a threat, while providing complete, real-time visibility across the digital business. Darktrace’s world leadership in the field of artificial intelligence for cyber security makes it the most effective and proven solution to detect unprecedented threats and anomalous cyber-incidents in the cloud. Whether faced with an insider threat, an attacker targeting sensitive data in test containers, or a significant misconfiguration that could be exploited in the fut
Tags : 
    
Darktrace
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. And with nearly all smartphones equipped with geolocation abilities, advertisements can be made location-aware with improved precision for targeting. Understanding location is key to gaining improved insights. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them to provide well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Smarp     Published Date: Feb 22, 2019
What is social recruiting Let’s face it, everybody’s on social media these days. Providing excellent targeting opportunities, social media channels are great channels for advertising jobs. Most of us are present on at least one social media channel, which makes them great places to search and find information about prospective candidates. Long story short, social recruiting is about leveraging social platforms in recruiting.
Tags : 
social recruiting, recruitment marketing, employee brand, employee advocacy
    
Smarp
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: MobileIron     Published Date: Feb 12, 2019
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. This paper examines some current mobile threat defense approaches to help organizations understand where traditional solutions may fall short — and how machine learning-based threat defense can expand upon those capabilities by providing immediate, on-device protection against mobile attacks.
Tags : 
    
MobileIron
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: Location3     Published Date: Feb 07, 2019
Each Location3 partner receives this customized approach as we work through the Local Search Roadmap, resulting in hyper-local optimizations targeting local consumers and queries. These efforts combine to increase online customer conversions and on-offline customer visits to your business.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local seo, local organic search, online visibility
    
Location3
Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is giving organizations the agility to respond quickly to demand for new products, services and applications. Many organisations begin their HCI journey by targeting specific use cases such as virtual desktop infrastructure, disaster recovery and remote office-branch office environments. But HCI continues to evolve far beyond these use cases. In this case study, we look at real world deployments to identify how HCI is helping businesses to reduce TCO, improve scalability and rapidly adopt new technologies. Please enter your details to view the case study.
Tags : 
    
VMware
Published By: HERE Technologies     Published Date: Dec 06, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and how you can harness the benefits and apply them to advertisement campaigns to attain more granular segmentation, precise targeting and a better audience experience. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: HERE Technologies     Published Date: Aug 17, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and how you can harness the benefits and apply them to advertisement campaigns to attain more granular segmentation, precise targeting and a better audience experience. In this report by Counterpoint Technology Market Research, learn why HERE’s Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jul 19, 2018
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
    
HERE Technologies
Published By: Monetate     Published Date: Jul 05, 2018
According to The Forrester Wave™: Experience Optimization Platforms, Q2 2018 report, as enterprises continue to consolidate online testing, behavioral targeting and recommendations practices, Experience Optimization Platform (EOP) Providers have been differentiating their services in two key areas: the ability to execute tests across digital channels, and sophistication of behavioral targeting and recommendation techniques. This report assesses the current offering, strategy, and market presence of eight EOP providers, including Monetate. In the report you’ll learn: • Three core capabilities Forrester considers requirements for savvy optimization. • EOP evaluation strategies you can use to evaluate your current vendor (or select a new one) • Criteria that Forrester used to determine Monetate as a “Strong Performer”
Tags : 
    
Monetate
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: Jebbit     Published Date: Jun 12, 2018
In the retail and eCommerce world, data can be your differentiator...or your downfall. To stand out, marketers are increasingly turning to first-party declared data to fuel their strategies. Learn how retailers are using mobile attention to collect and activate declared data for: Qualified lead acquisition and direct response Relevant remarketing with custom audiences and retargeting 1-to-1 email personalization Audience building and profiling
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.