target

Results 301 - 325 of 953Sort Results By: Published Date | Title | Company Name
Published By: Facebook     Published Date: Mar 07, 2012
Get set up with Facebook! This webinar will help you with top tips for creating an ad, targeting the right audience and improving your campaign performance.
Tags : 
facebook, marketing, social media, emerging marketing, social media marketing, market research
    
Facebook
Published By: AdRoll     Published Date: Apr 28, 2016
Trends and benefits of re-targeting in the world's largest social network
Tags : 
facebook, targeting, social, impressions, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing
    
AdRoll
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Published By: VMware     Published Date: Sep 13, 2011
Federal datacenters, which house an enormous wealth of legacy assets, are the primary targets for agencies evaluating different cloud computing approaches. When agencies begin their journey to the cloud with virtualization-an IT transformation starting point that preserves existing investments-they realize significant agility, cost and security benefits. Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new directives.
Tags : 
vsphere, vmware, storage, vsa, cluster service, technology, storage
    
VMware
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity
    
ThreatTrack Security
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: Insight Software     Published Date: May 22, 2018
Different finance departments want different financial solutions. Some may simply require financial reporting while, at the other end of the spectrum, some will want a comprehensive performance management solution. This paper compares different approaches to these choices that are available for the JD Edwards EnterpriseOne and World Enterprise Resource Planning (ERP) environments. The offerings in this space range from simple reporting tools to complete, integrated solutions. While noting the value that targeted toolsets provide, a survey of the available offerings suggests that most organisations are better served by implementing a holistic, integrated approach rather than a hybrid, multivendor approach.
Tags : 
performance, management, enterprise, environment, departments, spectrum, solutions
    
Insight Software
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: IBM     Published Date: Aug 06, 2014
For banks today, having more ways to communicate with customers is a good thing. But it has also made it harder for banks to figure out where and how to most profitably commit their marketing resources. Leveraging predictive analytics, First Tennessee Bank is applying the ultimate acid test. It’s combining a granular understanding of the needs of customer segments with real P&L data to optimize its marketing spend, focusing on programs that deliver the highest ROI. First Tennessee’s ability to target its campaigns more intelligently has increased its response rate by 3.1 percent, cut key marketing costs by nearly 20 percent and enables the bank to get the most from its resources.
Tags : 
ibm, banking, analytics, roi, marketing, p&l, data, emerging marketing
    
IBM
Published By: Act-On     Published Date: Sep 19, 2014
From Facebook and Twitter to blogs and videos, social media has become part and parcel of modern marketing efforts. However, convincing the C-suite to spend resources on social media can be a tough task for marketing trailblazers. Some executives have yet to be convinced that social media is a worthy marketing strategy; some wonder if it’s not just the latest black hole for marketing dollars. A marketer’s best course of action is managing social efforts to generate demonstrable return on investment. In this whitepaper, we’ll cover five best practices to help you do just that.
Tags : 
marketing content, business, solve, information, prospects, customers, educate, inform, sales process, guide, characteristics, marketing, targeted, points, audience, buying cycle, crm & customer care
    
Act-On
Published By: LogMeIn     Published Date: Oct 08, 2015
This eBook reveals the 5 best practices to emerge from data to help enable sales teams exceed targets.
Tags : 
optimise sales revenue, sales, social selling, optimise virtual selling, social media
    
LogMeIn
Published By: Sitecore     Published Date: Sep 10, 2015
A CMS is complex to evaluate as it has a number of different functions but this white paper will help you to focus on five key things to consider when evaluating your CMS solution.
Tags : 
crm, cms, targeting, social, webpages, sitecore, search marketing, crm & customer care, e-commerce
    
Sitecore
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: SDL Web Content Management Solutions     Published Date: Jul 06, 2010
In today's connected world, a well managed Web presence is essential for any organization to achieve business success. The internet provides unprecedented opportunities for border-free communication. Many organizations use the internet to reach worldwide audiences. These organizations need to balance centralized messages and branding with localized content and contributions. SDL Tridion's BluePrinting technology allows you to create this balance.
Tags : 
sdl tridion, blueprinting, communication, localization, multidimensional communication
    
SDL Web Content Management Solutions
Published By: E.ON     Published Date: Nov 21, 2018
The government has made it clear that it sees electric vehicles as the main way of reducing carbon emissions from road transport and improving air quality. The Road to Zero strategy states that the UK government wants 'one of the best electric vehicle infrastructure networks in the world' and unveiled targets for at least fifty per cent of new car sales to be ultra low emission by 2030, and forty per cent of new vans. See how E.ON can help your business get ahead of the game by downloading this whitepaper today!
Tags : 
    
E.ON
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Technology is a fast-moving target, and organizations need agility and flexibility to compete. By modernizing your data center and maximizing the value of your corporate data, your company can gain those qualities. In this Forbes Insights checklist, learn how to derive value from your corporate data and embrace three elements of a modernized data center: an agile data infrastructure, a modern approach to data protection, and intelligent data center operations.
Tags : 
    
Hitachi Vantara
Published By: Quantcast     Published Date: Jun 26, 2015
Learn how marketers are improving their digital campaigns to reach the right audiences.
Tags : 
quantcast, digital campaigns, measurability, audience targeting, brand marketers
    
Quantcast
Published By: Adobe     Published Date: Nov 07, 2013
Today’s leading DMPs are ingesting a wide range of owned and licensed data streams for insights and segmentation and are pushing data into a growing number of external targeting platforms, helping marketers deliver more relevant and consistent marketing communications.
Tags : 
adobe, the forrester wave, forrester dmp wave, audience management, data management platforms, multi-touchpoint targeting, multi-touchpoint execution, dmp vendor offerings, seamless data ingestion, message delivery, strong vendors, product evaluations, selecting right partner, audience insights, coordinated targeting
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
Most brands would love to have their apps among the top 25 most downloaded apps on the Apple App Store or Google Play. With more than one million apps available, there’s a great risk that your app won’t stand out from the crowd. Marketers need to make sure their core target audiences will first download and then regularly use their apps, without spending huge promotion budgets. This report will analyze how consumers discover apps and will provide some guidelines on how to promote your apps.
Tags : 
forrester, adobe, mobile app promotion, mobile app, mobile applications, apps, mobile marketing, promotion, social networking, digital marketing, launching apps, mobile technology, customer engagement, social media, internet marketing, e-commerce
    
Adobe
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: