target

Results 201 - 225 of 954Sort Results By: Published Date | Title | Company Name
Published By: Cadence9     Published Date: Jan 25, 2013
Content marketing is a marketing strategy fueled by the creation and sharing of content in order to attract, acquire and engage clearly defined target audiences.
Tags : 
    
Cadence9
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support, feature articles, case histories, application stories, press releases, social media, blogs, podcasts, press releases, rss feeds, webcasts, press release optimization, online media monitoring
    
Godfrey
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free IDC analyst report, discover why coordinating the activities of marketing and sales—from day one of the revenue cycle—is essential for profitability. Learn how to stop the revenue loss that occurs during a prospect handoff; how to give sales the freedom to target more efficiently, while enabling marketing to build better prospect relationships; and how to choose software that tightens the marketing/sales alignment. Download your copy of this insightful report now.
Tags : 
marketing, sales, alignment, coordination, software, leads, sales leads, demand generation, marketing automation, sales quota, sales training, sales roi, marketing roi, sales efficiency, sales-marketing integration, sales-marketing coordination, crm, customer relationship management, lead nurturing, lead recycling
    
Marketo, INC.
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: HERE Technologies     Published Date: Dec 06, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and how you can harness the benefits and apply them to advertisement campaigns to attain more granular segmentation, precise targeting and a better audience experience. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: SundaySky     Published Date: Mar 06, 2018
Cox Communications has been a SundaySky customer for five years, running personalized video ad programs through traditional video publisher channels. At the end of 2016, Cox Communications expanded that program to Facebook to see if greater levels of personalization and performance could be achieved by combining the dynamic capabilities of SmartVideo technology with the reach of the Facebook ads platform. The program targets recent Cox website visitors on Facebook and delivers them a relevant video ad with offers related to products and services they had viewed on Cox.com. The program leverages SundaySky’s SmartVideo platform to achieve Cox’s online revenue goals of maximizing the number of revenue-generating orders on its website while also lowering the cost per acquisition (CPA) as the program optimizes.
Tags : 
    
SundaySky
Published By: Dassault Systèmes     Published Date: May 09, 2018
Technology is transforming mobility and vehicle ownership. To be a game-changer in the transportation and mobility market, organizations must anticipate customer expectations and deliver compelling experiences. • Help my customers experience the future: Digitization, VR and interactive experiences show consumers benefits before they are on the road. • Give my customers enhanced levels of customization: Vehicle personalization transforms a product purchase to a multi-dimensional experience. • Streamline my product development processes: Innovation increases product diversity while reducing development time and costs. • Keep me up to speed with new mobility solutions: Organizations must be open to change in imagining how to go from point A to B. • Prepare me for the shift to Mobility as a Service: MaaS is already affecting transportation and pressuring margins for conventional car manufacturers. I invite you to download your targeted industry analysis and uncover the expectations to tak
Tags : 
    
Dassault Systèmes
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
Download this white paper to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, sustainability, environmental sustainability, energy goals, energy performance
    
IBM US Smarter Buildings
Published By: Oracle     Published Date: Jan 28, 2015
Retailers continue to collect this data and many have made good use of it, segmenting and targeting customers and rewarding loyal behavior with discounts and offers. Still, many sense that there’s untapped potential. They’re right. With the cost of data storage plummeting and the capabilities of analytical tools on the rise, this data’s value is set to skyrocket. John Bible, Senior Director of Retail Data Science and Insight at Oracle Retail shares his view on how insights from these vast data storehouses can scientifically inform retailers’ decision-making in critical strategic, tactical and operational areas, including category management, shelf space allocation and new product introductions.
Tags : 
    
Oracle
Published By: IBM     Published Date: Aug 06, 2014
Customer intelligence solutions that can enhance customer retention by leveraging advanced and predictive analytics tools to help enable more targeted sales, service and marketing plans. .
Tags : 
ibm, insurance, customer intelligence, solutions, retention, analytics
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Customer intelligence solutions that can enhance customer retention by leveraging advanced and predictive analytics tools to help enable more targeted sales, service and marketing plans.
Tags : 
insurance, customer intelligence, solutions, customer retention, marketing plans
    
IBM
Published By: iKnowtion     Published Date: Sep 14, 2010
The terms "customer segmentation" and "customer predictive modeling" are often used interchangeably, however, they're very different and support different business objectives. This paper explains why both are required to effectively compete in today's customer-centric marketing landscape.
Tags : 
crm strategies, customer intelligence, marketing analytics, customer development, marketing effectiveness, iknowtion, segmentation, modeling, predictive modeling, customer centric, targeted, roi
    
iKnowtion
Published By: Bit9     Published Date: Mar 07, 2013
Download Bit9’s latest Threat Advisor and see how a trust-based security platform can help you protect your core IP.
Tags : 
security, risk management, cyber threats, security breaches, cyber espionage, nsa, intellectual property
    
Bit9
Published By: Akamai Technologies     Published Date: Aug 11, 2017
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
cybercrime, security, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
    
Akamai Technologies
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks
Published By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).
Tags : 
cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security
    
BitSight Technologies
Published By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : 
cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures
    
Kaspersky
Published By: Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
Cylance
Published By: Oracle     Published Date: Oct 23, 2014
If you are a marketer and are looking to scale your efforts in an efficient and effective manner, data has quickly become the core of your strategy and will continue to drive your efforts for many years to come. This report will show you the amazing possibilities.
Tags : 
data management, demystified, audience, targeting, scale, marketing, programs, actionable, agencies, outcome, activation, crm & customer care, marketing research
    
Oracle
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: