re targeting

Results 51 - 75 of 163Sort Results By: Published Date | Title | Company Name
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: GrowthIntel - INT     Published Date: Jul 06, 2017
For many B2B companies, the best way to generate new business is the old fashioned one – a team of telemarketers hitting the phones to make sales appointments for their more experienced colleagues. But they are losing money every time a telemarketing agent calls somebody that doesn’t want to buy from them. This ebook will explain: • Why you could be wasting 97.6% of your time • The root of telemarketing’s targeting problem • A better way to classify companies; and • A smarter way to go to market
Tags : 
b2b, intel, telemarketing, targeting, conversation, reduce costs, business performance, sales, data efficiency
    
GrowthIntel - INT
Published By: Eloqua     Published Date: Jan 13, 2012
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting
    
Eloqua
Published By: Silverpop     Published Date: Sep 19, 2011
New innovations in marketing automation now enable savvy, self-sufficient marketers to easily develop more comprehensive lead-scoring models that, along with Web tracking, behavioral targeting and careful segmentation, can lead to more sophisticated nurturing programs that better educate and engage prospects and increase your chances of making a sale.
Tags : 
silverpop, marketing, behavioral targeting, segmentation, social media
    
Silverpop
Published By: Adobe     Published Date: Mar 03, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals. The Adobe guide, Play to Win in Audience Intelligence, shows you how. Read the guide to learn: • How to bring your data sources together into a unified view of the customer • How to move beyond basic demographic attributes to behavior attributes • How to use look-alike modeling to improve customer targeting and acquisition
Tags : 
audience intelligence, audience engagement, unified data source, behavior attributes, look-alike modeling
    
Adobe
Published By: GrowthIntel     Published Date: Feb 16, 2016
There are potentially tens of thousands of buyers who don’t know that they need your products or services. They are your passive, silent audience. And, if you want to grow quickly, that audience is absolutely vital. You can’t reach them using personas, content marketing, or retargeting – so how do you find buyers who’ve never even heard of you? This ebook explains how to reverse-engineer their digital footprints and follow the trail back to the owner.
Tags : 
advertising, medicine, clinical management, b2b, sales, business behavior, advertising agencies
    
GrowthIntel
Published By: Jebbit     Published Date: Jun 12, 2018
In the retail and eCommerce world, data can be your differentiator...or your downfall. To stand out, marketers are increasingly turning to first-party declared data to fuel their strategies. Learn how retailers are using mobile attention to collect and activate declared data for: Qualified lead acquisition and direct response Relevant remarketing with custom audiences and retargeting 1-to-1 email personalization Audience building and profiling
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Silverpop     Published Date: Jun 15, 2012
Driving traffic to the company website is a primary goal for many marketers, but what do you do when visitors leave without converting? Learn how retargeting can help keep your brand top of mind, entice contacts to return and take action, and increase revenue.
Tags : 
marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns, retargeting, online, digital, customer, revenue
    
Silverpop
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder
    
Citrix Systems
Published By: Turn     Published Date: Mar 09, 2016
Today’s programmatic advertising—let’s call it 2.0—delivers the accuracy and precision needed to provide that personal touch. Make an impact with unprecedented control over platform and context, incredibly accurate targeting, and of course, massive reach.
Tags : 
programmatic, programmatic advertising, brand marketing, smart market, building brand, dsp, demand side platform, accurate targeting, targeting techology, omnichannel, multichannel
    
Turn
Published By: Oath     Published Date: May 31, 2017
Understanding smartphone users’ behavior in the physical world is fueling the rise of location-based retargeting. Digital consumption on mobile devices surpassed desktop in 2015 and continues to grow. Using location as a signal of consumer activity and interest, advertisers can drive relevance and increase user engagement with their ads. Learn more in our infographic.
Tags : 
native advertising, native ads, search ads
    
Oath
Published By: Monetate     Published Date: Jul 05, 2018
According to The Forrester Wave™: Experience Optimization Platforms, Q2 2018 report, as enterprises continue to consolidate online testing, behavioral targeting and recommendations practices, Experience Optimization Platform (EOP) Providers have been differentiating their services in two key areas: the ability to execute tests across digital channels, and sophistication of behavioral targeting and recommendation techniques. This report assesses the current offering, strategy, and market presence of eight EOP providers, including Monetate. In the report you’ll learn: • Three core capabilities Forrester considers requirements for savvy optimization. • EOP evaluation strategies you can use to evaluate your current vendor (or select a new one) • Criteria that Forrester used to determine Monetate as a “Strong Performer”
Tags : 
    
Monetate
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: Smarp     Published Date: Feb 22, 2019
What is social recruiting Let’s face it, everybody’s on social media these days. Providing excellent targeting opportunities, social media channels are great channels for advertising jobs. Most of us are present on at least one social media channel, which makes them great places to search and find information about prospective candidates. Long story short, social recruiting is about leveraging social platforms in recruiting.
Tags : 
social recruiting, recruitment marketing, employee brand, employee advocacy
    
Smarp
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex
    
Dell Software
Published By: Limelight Networks     Published Date: Feb 14, 2012
An effective mobile website experience is essential to your brand's success. In this report, learn insights on how to extend your brand image effectively across mobile devices and tips for targeting multiple mobile platforms
Tags : 
e-commerce
    
Limelight Networks
Published By: Movable Ink     Published Date: May 05, 2014
Each season, the Movable Ink team looks back at recent campaigns and honors five brands for creating engaging agile email marketing experiences that stood out in the inbox. Download the Spring 2014 edition of The Inkredible Five to see standout emails from brands like Lilly Pulitzer, The Wall Street Journal, and 7 For All Mankind.
Tags : 
agile, email, dynamic content, live content in email, crm, real time, marketing, innovative, top five, video, social media, geo targeting, personalization, emerging marketing, crm & customer care
    
Movable Ink
Published By: Wyng     Published Date: Jan 13, 2016
McCormick Canada teamed up with Offerpop to launch their highly successful “McCormick Online Cook Off” contest, which invited users to share their best recipes with the brand for a chance to win some really great prizes. Instead of targeting a user base that is already highly saturated with direct competitors, McCormick Canada decided to target an entirely new, untapped market — second generation Filipino-Canadians with a highly customized campaign. By coupling an extremely easy and fun to enter contest with their in-depth customer analysis, McCormick Canada was able to create a wildly successful experience that greatly increased their unit sales year-over-year.
Tags : 
search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing
    
Wyng
Published By: Chango     Published Date: Apr 17, 2012
To most marketers, 'retargeting' means placing display ads in front of people who have visited a website. This is a limited view: retargeting can be used for acquisition and prospecting, not just winning back lost visitors.
Tags : 
retargeting, remarketing, remessaging, re-targeting, search retargeting, site retargeting, behavioral targeting, chango, magnetic, adwords, search engine marketing, paid search, sem
    
Chango
Published By: VIDEOHUB     Published Date: Mar 14, 2012
When you sign up and complete $2500 worth of advertising on Videohub Marketplace, we add $500 to your account, which you can use immediately in crease your reach or save for a future campaign.
Tags : 
acudeo, adwords, beet tv, bright cove, buy video ad, dealer marketing, google ad, hotel marketing, iab, jw player, local business marketing, local tv, local video marketing, long tail tv, online video ad, ova, pre roll, real estate marketing, restaurant marketing, spot tv
    
VIDEOHUB
Published By: Beyond.com     Published Date: Nov 28, 2011
Learn how a smart niche recruitment strategy can effectively and affordably target the right candidates, and significantly reduce your cost per hire.
Tags : 
niche recruitment, recruiting, recruitment, hire, hiring practices, qualified candidates, talent acquisition, talent sourcing, targeting, budget, strategy, applicant pool, career website, career network, online recruiting, hr professionals
    
Beyond.com
Published By: IBM     Published Date: Aug 01, 2012
Discover how using predictive analytics can help your company convert prospects and cross-sell to existing customers. The campaign optimization capabilities provided with predictive analytics offer an unprecedented level of targeting and coordination across all channels - quickly resulting in decreased costs and increased revenue.
Tags : 
ibm, marketing, technology, campaign profitability, predictive analytics, analytics, roi, crm, customer, business, white paper
    
IBM
Published By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Published By: IBM     Published Date: May 22, 2013
When it comes to application infrastructure, some of the burning questions that organizations are asking themselves include: If I host some of my application functionality in the could, how do I integrate that with my existing on-premises applications? How do I integrate my on-premises application with external business partners? Everyone is talking about platform as a service (PaaS). Should I use it? If so, when and when not? In this research, we address these questions by introducing the concept of iPaaS, a specific form of PaaS targeting integration and governance requirements, and how it can be used to address cloud-to-on-premises and other related requirements.
Tags : 
ibm, cloud, infrastructure, applications, application infrastructure, platform as a service, ipaas, paas
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: