target

Results 301 - 325 of 1030Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality.
Tags : 
    
Cisco Umbrella EMEA
Published By: ABB     Published Date: Mar 21, 2019
In recent years, Europe has seen a real boost in the building of renewable generation capacity. Germany is a notable example of a country with significant growth in renewables. As shown in Figure 1 below, since 2000, the average annual growth of installed capacity in Germany has been more than 15 percent, reaching 18-20 percent between 2009 and 2010. For the most part, favorable conditions for the development of renewables have been caused by support schemes, previously based on feed-in-tariffs and competitive auctions. Now the country has reached a point where renewables account for around 53 percent of installed capacity and around 36 percent share in total electricity demand, already exceeding the 2020 target of 35 percent.
Tags : 
    
ABB
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Oracle OMC     Published Date: Aug 30, 2018
Why cast a wide net when you can spearfish instead? Target the right people based on the right attributes with the right technology – and leave wasted impressions in the dust. Learn how to segment smarter here.
Tags : 
    
Oracle OMC
Published By: Monotype     Published Date: Aug 24, 2016
The world of digital advertising is changing—HTML5 has replaced Flash as the industry standard for digital ads. Find out how this change benefits your workflow, branding, and—most importantly—your customers. In this eBook, you’ll learn what HTML5 is and how it differs from Flash, how you can use HTML5 to make better ads, and why you need to get on board with HTML5 now.
Tags : 
digital advertising, html5, flash, monotype, web fonts, internet marketing, targeting, branding, end of flash, user experience, marketing best practices, banner ads, marketing, emerging marketing, display advertising, design, creative, responsive ads, dynamic ads, mobile ads
    
Monotype
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Sage People     Published Date: May 18, 2018
In some kinds of more traditional businesses the finance department tends to swallow as much data as is thrown at it but only outputs small, measured and curated amounts of insights periodically: “Here’s revenue vs target in the last quarter”. These are undoubtedly essential for proper business management, But periodic reports also mean it can be too late for the business to respond. It’s like driving by looking only in the rear-view mirror. Looking at what’s behind isn’t going to let you spot a sudden bend in the road! Essentially, the highly competitive and evolved business environment of today requires businesses to have proactive, indicative business metrics. Combined with more traditional metrics, these mean businesses have invaluable and complete insight in order to evaluate performance. Proactive, indicative business metrics are found across most successful businesses–and especially amongst C-suite employees. These people know that the benefits are proven. Analytics-driven execu
Tags : 
    
Sage People
Published By: Citrix     Published Date: Jun 03, 2015
Download now to uncover five things you need to do to get the right people in your webinars.
Tags : 
webinars, webinar
    
Citrix
Published By: Oracle     Published Date: Jun 04, 2019
The results presented in this report are based on a mobile-only, 23-question global survey. This survey targeted Manager, Director, Vice President or C-Level executives with influence in the decision-making process of cloud solutions, platforms, and infrastructure or department specific software. Respondents worked within organisations generating revenues between less than £1 million to more than £500 million, with 100 to 50,000 employees. Who believes they are truly capable of managing this deluge of data? To find out download this survey today!
Tags : 
    
Oracle
Published By: Oracle OMC     Published Date: Nov 30, 2017
Executing a data-driven digital advertising campaign, with a clear understanding of your target, provides you with marketing that is accountable based on revenue. And this data-driven approach is better for your prospects and customers due to relevance. Relationships thrive when you’re communicating in context on a oneto- one basis. Marketing has the opportunity to reinvent itself as a core part of a company’s revenue engine.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy closely aligned to buyer needs and expectations across all phases of the buying process. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Marketers are increasingly enhancing their understanding of how data can fuel the delivery of meaningful interactions. This access to vast sources of information that marketers are applying to execute and achieve more refined marketing simply can’t be gleaned manually.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus
    
MessageLabs
Published By: Clearswift     Published Date: Jun 09, 2008
This short guide summarizes ten steps to web security. Do them all, and you'll be better protected than 98% of enterprises out there. But the target never stands still. More than the steps listed here, it's important to focus on the principles behind the steps, including: policy, vigilance, simplification, automation and transparency.
Tags : 
clearswift, web security, internet security
    
Clearswift
Published By: Facebook     Published Date: Mar 07, 2012
Get set up with Facebook! This webinar will help you with top tips for creating an ad, targeting the right audience and improving your campaign performance.
Tags : 
facebook, marketing, social media, emerging marketing, social media marketing, market research
    
Facebook
Published By: ESET     Published Date: Sep 21, 2012
Cyber-thieves are targeting smaller businesses, is yours next? Less IT staff and tight budgets make you a target. Get this critical tech brief to learn about four critical security counter measures.
Tags : 
cybercrime, security, eset, defense, small business
    
ESET
Published By: Realtime Publishers     Published Date: Jul 21, 2011
Learn how to execute successful content marketing strategies to target your prospects and advance them towards evaluating your software product or solution.
Tags : 
realtime publishers, content marketing campaign, it lead generation, software evaluations, drive software downloads, lead nurturing, content mapping, software technology marketing
    
Realtime Publishers
Published By: Advertising.com Sponsored Listings     Published Date: Dec 12, 2011
Advertising.com's premium sponsored listings network gives you an unmatched ability to target your text ads by site, section, or page on the web's most popular sites.
Tags : 
cpc, advertising.com, text ads, contextual ads, contextual advertising, search ads, search advertising
    
Advertising.com Sponsored Listings
Published By: Data Stax     Published Date: Apr 27, 2012
This paper will enable those implementing a NoSQL strategy to make more informed decisions when (1) choosing a particular set of NoSQL software, and (2) deciding which vendors to target. Find out more today!
Tags : 
sql, data stax, datastax, nosql, software, database management, data management, database
    
Data Stax
Published By: Symantec     Published Date: Oct 19, 2012
Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools - which ones are currently best-of-class?
Tags : 
endpoint protection, symantec, data security, proactive tools, security analysis
    
Symantec
Published By: Brainshark     Published Date: Oct 16, 2013
Running low on content for your next campaign? Learn how leading marketers are repurposing existing content and delivering it in a creative, targeted and measurable format that fuels successful lead generation—while also saving time and money.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: