target

Results 301 - 325 of 1055Sort Results By: Published Date | Title | Company Name
Published By: Pluris     Published Date: May 05, 2015
Today's dynamic marketplace requires companies not only to maintain a consistent, effective message across marketing channels but to execute that messaging economically, maximizing the investment and consistently improving ROI. Download this white paper today to discover what tools you need to improve omni-channel marketing and increase marketing performance.
Tags : 
pluris, performance marketing, omni-channel, cost effectiveness, emerging marketing, crm & customer care
    
Pluris
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
Published By: HERE Technologies     Published Date: Sep 23, 2019
While the retail industry has made great stri des in understanding the online journeys of consumers, it has been difficult to observe and analyze their wh ereabouts and movements offline . Advanced location intelligence enables marketers to observe consumer journeys to within meters, whether indoors or outdoors, as they move ar ound ever - changing environments, such as stores, malls, restaurants, residential addresses, landmarks, and places of interest. This eBook explores how retailers are starting to launch more targeted campaigns by using location to understand consumer behavior. Find out why location intelligence ca n bring a wide range of benefits to the entire retail industry : data - driven audience segmentation, real - time location targeting, reduced ad - spend, enhanced campaign attribution, and more.
Tags : 
    
HERE Technologies
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 26, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year. Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers, your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
Best practices to prevent, detect, and respond to a ransomware attack targeting your backups
Tags : 
    
Cohesity
Published By: Ability Commerce     Published Date: May 18, 2009
As direct marketers, you know "the devil is in the details." Being able to drill-down on results is important to determine future strategies. It takes discipline and the application of direct marketing tenets. But you can fine-tune your results, target better and reap the rewards.
Tags : 
ability commerce, seo, email frequency, metrics, roi, pci, ecommerce, e-commerce
    
Ability Commerce
Published By: Bronto     Published Date: Jul 16, 2012
Acquiring addresses is as essential as creating a targeted message. Learn where the best places are to start and how you can continue to grow strong lists over time. Download this whitepaper to learn more.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, list management, customer, customer experience/engagement
    
Bronto
Published By: Mimecast     Published Date: Jul 15, 2019
The Mimecast Supervision solution enables compliance personnel to systematically review and discover targeted data among the volume of communications organizations face today. Integrated with the industry leading Mimecast Cloud Archive, users can facilitate an auditable, managed supervision review process, flexible to meet the needs of the business while utilizing a scaleable, immutable SEC 17A-4 validated and tamper proof archive with guaranteed 7 second SLA search capabilities. To reduce the number of false positives in sampling data, targeted detection rules can focus on specific senders/recipients and to accelerate the process. In addition, queues can be configured with an upper limit upon which to be populated with email. This helps limit the amount of email a reviewer must go through while still identifying risk. Today’s supervision demands require reviewers to be highly productive.
Tags : 
    
Mimecast
Published By: Quantcast     Published Date: Feb 13, 2015
Twitter ist ein globales Phänomen, das die Art, wie Marken und Konsumenten online miteinander interagieren, quasi buchstäblich verändert hat. Erst kürzlich hat Twitter eine Werbemöglichkeit gelauncht, mit der Unternehmen und Marken ihre Tweets und Accounts über Zielgruppen-Targeting an die richtigen Nutzer ausliefern können. Diese neue Werbeform – bekannt als „tailored audiences” oder „maßgeschneiderte Zielgruppen” – ermöglicht es Unternehmen, ihre eigenen Daten zu verwenden, um ein detaillierteres Targeting zu erstellen und noch bessere, maßgeschneiderte Werbung über Twitter auszuliefern.
Tags : 
tailored audiences, quantcast, real time-marketer, twitter, emerging marketing, social media, business intelligence, market research
    
Quantcast
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance
    
BMC Software
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Adobe     Published Date: Sep 23, 2019
Email provides the wedge into customer-obsessed marketing Every day, demanding customers, unforeseen competition, and disruptive new technologies hammer home that we have entered the age of the customer, where established business operations don't work. Yet most marketing functions still rely on decades-old methods that undermine their ability to create post-digital brand experiences and help their firms become customer focused. Email marketing – the workhorse of the marketers’ toolkit – can provide a way to launch customer obsessed marketing at your firm, if you use it as more than just a promotional vehicle. marketers need a more advanced email marketing program. 95% believe they would benefit from it. 64% agree that they use their email marketing program as a strategic asset for innovation But it’s difficult to achieve. 91% experience challenges, including lack of budget, vision, and cross-collaboration WHY TARGET AUDIENCE SHOULD CARE? Smart CMOs re
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues
    
Adobe
Published By: Oracle     Published Date: Oct 22, 2015
In high volume, low margin grocery retailing, merchants have to be on their toes when it comes to driving customer demand and loyalty. This comprehensive eBook details the essential steps required to enable a commerce anywhere strategy in grocery retail. With specific attention to developing a strategy, optimizing inventory, ensuring planning is targeted and scientific, and the power of real-time analytics will provide the reader an actionable plan for success.
Tags : 
oracle retail. grocery retailing
    
Oracle
Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto
Published By: FICO EMEA     Published Date: Aug 30, 2019
Telecommunications companies lost more than $29 billion to consumer fraud in 2017 globally (1.27% of their revenues). The largest and most advanced communications service providers (CSPs) have sophisticated fraud detection systems and processes in place, but those organizations are now questioning their fraud readiness. Are they doing enough? Fraudsters may be individuals or increasingly sophisticated criminal networks. They constantly develop new methods and target new lines of business Read this interview where Anat Hoida, Head of the FICO’s Telecom Practice in Europe, Middle East, and Africa, discusses the impacts of the evolving spectrum of fraud risks on the growth and competitiveness of CSPs globally.
Tags : 
telecom subscription fraud, prevent fraud, fight fraud using analytics
    
FICO EMEA
Published By: Pure Storage     Published Date: Apr 10, 2019
Pure Storage, a pioneer in block-based flash arrays, has developed a technology called FlashBlade, designed specifically for file and object storage environments. With FlashBlade, IT teams now have a simple-to-manage shared storage solution that delivers the performance and capacity needed to bring Spark deployments on premise. To help gain a deeper understanding of the storage challenges related to Spark and how FlashBlade addresses them, Brian Gold of Pure Storage sat down with veteran technology journalist Al Perlman of TechTarget for a far-reaching discussion on Spark trends and opportunities.
Tags : 
    
Pure Storage
Published By: Jigsaw     Published Date: Mar 15, 2010
One of the great myths in marketing & sales is that generating lots of 'leads' or 'awareness' for a product automatically translates into lots of new business. But quantity does not equal quality. The truth is this: if you don't have a clear denition of who your ideal customer is, why they buy, the language and stories that are meaningful to them, and where they live, you won't find them. Use this worksheet to help.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: apperian     Published Date: Apr 13, 2012
Enterprise app stores seem to be a proverbial win/win situation. Businesses win because they don't have to hang out with the unincorporated, if not unwashed, consumer masses. It's a win for the ecosystem of app store providers who suddenly have a much larger and more granular market to target. Read to find out more.
Tags : 
apperian, technology, business technology, enterprise, app store, mobile
    
apperian
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices
    
Entrust Datacard
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.