target

Results 226 - 250 of 936Sort Results By: Published Date | Title | Company Name
Published By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: MobileIron     Published Date: Oct 29, 2018
Mobil Banking: Big Business, Big Target, Big Opportunity
Tags : 
    
MobileIron
Published By: SiteSpect     Published Date: Apr 14, 2015
New E-Book from SiteSpect Explains Five Ways to Enhance the Online Customer Experience Financial services companies around the world have extended their businesses online, and with that comes the ability to better target and interest prospects as well as offer new services and information to clients. One thing is clear: optimizing the online customer experience is key to achieving your marketing goals.
Tags : 
website optimization, website optimisation, site optimization, site optimisation, site optimization financial services, optimize financial site, optimize financial services website, financial services site optimization, optimizing financial services website, search marketing, website development
    
SiteSpect
Published By: Affirm     Published Date: May 11, 2015
You’ve probably heard that Millennials make up nearly a quarter of the U.S. population, and contrary to popular belief, contribute a sizeable amount to retail sales each year. However, you’ve probably also heard that Millennials think, breathe, act and shop very differently than your traditional customers. Fear not!This article will arm merchants with important insights into the lives of Millennials, and provide helpful tools to convert your Millennial target audience into happy customers.
Tags : 
millennial shoppers, retail sales, traditional customer, important insights, customer experience
    
Affirm
Published By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: IBM     Published Date: Jul 28, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior-and profitable-interactions with customers. You'll learn: What it takes to uncover hidden trends and explore relationships across disparate data sources using natural language queries Ways to use in-depth insight to create highly relevant campaigns and content that's aligned with individual customer behaviors and preferences How to take product recommendations to new levels of accuracy with pinpoint prediction and targeting.
Tags : 
ibm, commerce, analytics, business insight, business analytics, business advisor, commerce data, predictive analytics
    
IBM
Published By: Juniper Networks     Published Date: Oct 31, 2016
To gain transformational benefit from a private and/or hybrid cloud deployment, I&O leaders should look beyond provisioning compute and storage to address the networking domain; those that don't will sacrifice business agility.
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Apr 21, 2017
"When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing. Speakers include Liz Miller, Senior Vice President of Marketing for the CMO Council; Jody Sarno, Dedicated Client Partner, Communications Industry for IBM; Chris Crayner, Ch
Tags : 
ibm, senior marketing decision makers, audience targeting, digital experiences, branding
    
IBM
Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
Published By: CrowdStrike     Published Date: Aug 01, 2017
Learn the inner workings of ransomware and how companies are fighting back. Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs.Download this whitepaper to learn:?The evolution of Ransomware and why businesses can’t afford to ignore it?How perpetrators tactics and targets are evolving to maximize profits?Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
    
CrowdStrike
Published By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
IBM SPSS predictive analytics solutions help uncover key predictors that lead to online student success or failure. Identifying specific issues early, target intervention measures for at-risk students, and take the appropriate steps to help improve online student graduation rates.
Tags : 
online education, online students, graduation rates, spss
    
Group M_IBM Q1'18
Published By: IBM     Published Date: May 30, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 16, 2018
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
Tags : 
    
Group M_IBM Q418
Published By: SundaySky     Published Date: Mar 06, 2018
Cox Communications has been a SundaySky customer for five years, running personalized video ad programs through traditional video publisher channels. At the end of 2016, Cox Communications expanded that program to Facebook to see if greater levels of personalization and performance could be achieved by combining the dynamic capabilities of SmartVideo technology with the reach of the Facebook ads platform. The program targets recent Cox website visitors on Facebook and delivers them a relevant video ad with offers related to products and services they had viewed on Cox.com. The program leverages SundaySky’s SmartVideo platform to achieve Cox’s online revenue goals of maximizing the number of revenue-generating orders on its website while also lowering the cost per acquisition (CPA) as the program optimizes.
Tags : 
    
SundaySky
Published By: Pindrop Security     Published Date: Mar 21, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Oracle OMC     Published Date: Aug 30, 2018
Why cast a wide net when you can spearfish instead? Target the right people based on the right attributes with the right technology – and leave wasted impressions in the dust. Learn how to segment smarter here.
Tags : 
    
Oracle OMC
Published By: Monotype     Published Date: Aug 24, 2016
The world of digital advertising is changing—HTML5 has replaced Flash as the industry standard for digital ads. Find out how this change benefits your workflow, branding, and—most importantly—your customers. In this eBook, you’ll learn what HTML5 is and how it differs from Flash, how you can use HTML5 to make better ads, and why you need to get on board with HTML5 now.
Tags : 
digital advertising, html5, flash, monotype, web fonts, internet marketing, targeting, branding, end of flash, user experience, marketing best practices, banner ads, marketing, emerging marketing, display advertising, design, creative, responsive ads, dynamic ads, mobile ads
    
Monotype
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: