target

Results 251 - 275 of 1014Sort Results By: Published Date | Title | Company Name
Published By: Oath     Published Date: Nov 29, 2017
Target, reach and engage your audience to drive measurable action and conversions with Yahoo Gemini native advertising solutions. Get more customers Native ads deliver up to 3.6X lift in searches for your brand name and services. Yahoo native ads e?ectively enhance your search campaigns. Drive better results Achieve results with targeted reach and up to 4x the performance of traditional banners. Engage a mobile audience 650M of our 1B global users are on mobile. Consumers spend nearly 3 hrs. on their mobile devices each day. Cost e?ective ads Native ads deliver up to 3.6X lift in searches for your brand name and services. Yahoo Gemini native ads on Oath owned and operated sites and apps can be purchased on a CPC or CPM basis. Native ads will be served to your customers based on their geo, demo and interest targets.
Tags : 
    
Oath
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"The days of a consistent and reliable “search, click, buy” process are long gone. In its place is often a complicated web of deliberate steps, each one inching your target consumer closer to the “buy now” button over the course of many days, weeks or months. This continually-evolving journey is no longer a clear-cut funnel, but more of a maze. Each consumer path is unique and uncertain — which means today’s e-commerce seller hasn’t reached its full potential until it’s maintaining a strong presence at every twist and turn. Download this eBook to learn how to leverage a wide range of marketplace and digital marketing tactics to reach consumers at any stage of their journey."
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, consumer behavior, consumer journey
    
ChannelAdvisor
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Anaplan     Published Date: Nov 27, 2017
"The pressure on sales to meet and exceed ever-increasing revenue targets is higher than ever before. At the heart of this challenge lies a complex analytical and modeling problem that involves data spread across many rigid–and usually disconnected–systems, teams, and geographies. Leading companies handle this problem by focusing first on creating a sales performance plan that is data-driven and tied to business objectives. The research report conducted by Harvard Business Review provides you with how today's sales executives: • Overcome technology weaknesses to uncover sophisticated analytics • Change ingrained, cultural tendances of sales organizations • Adopt dynamic practices to respond to change quicker"
Tags : 
    
Anaplan
Published By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : 
source, language, english, spanish, speech to text, database, analytics, audio message
    
IBM APAC
Published By: Mintigo     Published Date: Nov 20, 2017
What is ABM and why is it so cool? Rarely do new trends catch the attention of marketers with the velocity and intensity of Account Based Marketing (ABM). So what is ABM and how should marketing and sales executives strategically evaluate an ABM program for their organization? The definition of ABM is: The systematic process to use data and intelligence to discover, identify, segment, target, engage and win business.
Tags : 
    
Mintigo
Published By: Mintigo     Published Date: Nov 20, 2017
Predictive Marketing is a fundamental shift in the way B2B companies engage buyers. In the first book of its kind, Mintigo CEO Jacob Shama explores how data science and AI enable marketers and sales reps to target, engage, and convert the most likely prospects with unparalleled precision. This ebook will guide you through the science, applications, and results of this new technology, and show you how to use it to empower your organization. Download now.
Tags : 
    
Mintigo
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services
    
McAfee EMEA
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
    
Adobe
Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula
Published By: Sojern     Published Date: Oct 26, 2017
The Sojern Traveler Platform offers hotels of all sizes access to over 350 million traveler profiles that allow you to precisely target prospects at all stages of the marketing funnel. You can also manage campaigns across multiple channels and devices, maintain brand awareness, increase purchase consideration, and turn site visitors into hotel room bookers.
Tags : 
hotel digital marketing, hotel advertising, boutique hotels, independent hotels, hotel website, travel marketing, search engine marketing hotels, revpar
    
Sojern
Published By: Workterra     Published Date: Oct 25, 2017
Any number of characteristics put the mid-market employer in a league of its own, placing it somewhere between the niche-focused small businesses of Main Street, USA, and the complex enterprise-level organizations that conduct business on a global scale. HR technology is a shining example of this place in the middle. HR for mid-market employers must fulfill needs that can’t be met by benefits administration and core HR solutions designed to narrowly target either small businesses or enterprise organizations.
Tags : 
    
Workterra
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: CrowdStrike     Published Date: Oct 23, 2017
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? A new white paper, “The Five Essential Elements of Next -Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: Details on the five essential capabilities that define true next-generation EPP and why they are so important A matrix that evaluates and compares the potential impact of different solutions A list of top questions to ask ve
Tags : 
    
CrowdStrike
Published By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: SAS     Published Date: Oct 18, 2017
With the support of SAS, the Internet of Things Institute developed the 2017 Internet of Things ROI Research Study to gather real-world insights, lessons learned and future guidance from current users of IoT technology and advanced analytics. This selective sample of IoT users offers valuable insights to both IoT innovators and organizations still waiting to see how the technology evolves before investing. Multiple business layers and functions have input into IoT decision making. Discover which layer was most critical to success for those organizations that have achieved the highest percentage of their targeted ROI. Learn about the main drivers of success for IoT users achieving higher returns. Lastly, the results highlight six primary factors that can undermine an IoT initiative and how they can be prevented.
Tags : 
    
SAS
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: Oracle Marketing Cloud     Published Date: Oct 11, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy aligned to buyer needs across all phases of the buying process — marketing automation. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Find marketing automation fundamentals here.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy aligned to buyer needs across all phases of the buying process — marketing automation. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Find marketing automation fundamentals here.
Tags : 
    
Oracle Marketing Cloud
Published By: Secureworks     Published Date: Oct 04, 2017
Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems. Yet, 36 percent also say their organizations were victims of ransomware in the past year. And 57 percent say they are more likely to be a ransomware target in 2017.
Tags : 
    
Secureworks
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.