target

Results 26 - 50 of 955Sort Results By: Published Date | Title | Company Name
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen
    
Unica
Published By: Viavi Solutions     Published Date: Feb 22, 2018
Is your Network Performance Monitoring and Diagnostics (NPMD) solution a target for attackers? With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. NPMD tools that do not keep pace can leave your information vulnerable.
Tags : 
    
Viavi Solutions
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"Still thinking of employee learning and business needs as separate – or competing – entities? Your employees want targeted training that’s ready when they are, and they also want to be rewarded for developing new skills. Companies also want to provide learning, but only if it shows results at the lowest possible cost. In fact, 59% of employees said that access to projects to help keep their skills up-to-date would keep them satisfied at their current company. So how do you reconcile the two? Download this brief to learn ‘3 Ways to Tie Learning Directly Into Business Needs.’ "
Tags : 
    
Cornerstone OnDemand
Published By: Cox Communications     Published Date: Nov 10, 2014
The waiting room experience at your business can make or break customer service. Customers not only feel special when they wait in style, it’s good for business too. You can give your hotel, retail store, auto repair shop, or other service-oriented business a big boost by customizing your waiting room to feature free Wi-Fi, TV or technology workspace.
Tags : 
wi-fi, business advantages, workspace utilization, targeting content, cox
    
Cox Communications
Published By: Dun & Bradstreet     Published Date: Dec 08, 2015
A guide to creating stronger marketing campaigns with better data.
Tags : 
    
Dun & Bradstreet
Published By: ESET     Published Date: Sep 21, 2012
Cyber-thieves are targeting smaller businesses, is yours next? Less IT staff and tight budgets make you a target. Get this critical tech brief to learn about four critical security counter measures.
Tags : 
cybercrime, security, eset, defense, small business
    
ESET
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Limelight Networks     Published Date: Feb 14, 2012
An effective mobile website experience is essential to your brand's success. In this report, learn insights on how to extend your brand image effectively across mobile devices and tips for targeting multiple mobile platforms
Tags : 
e-commerce
    
Limelight Networks
Published By: Limelight Networks     Published Date: Oct 17, 2011
An effective mobile website experience is essential to your brand's success. In this report, learn: . Insights on how to extend your brand image effectively across mobile devices . Tips for targeting multiple mobile platforms . Strategies for optimizing content publishing and performance
Tags : 
mobile strategy, mobile site, mobile website, mobile marketing, mobile web
    
Limelight Networks
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : 
advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising, dsp, rtb, ad networks, ad exchanges, iab, banner ads, clickthrough, pixel, pixel tracking, mobile device detection, video advertising, interactive advertising
    
Mirror Image Internet
Published By: Salesforce.com     Published Date: Sep 16, 2013
The typical strategy for meeting sales targets is to set aggressive individual rep quotas, rely on your top reps to achieve them, and then hope to get enough from the rest of your team to get over the top. Find out how to make a major shift in your sales approach for the better in order to both increase individual sales rep effectiveness and improve collaborative team selling. Download now.
Tags : 
crm, technology, chart, customer relationship management, solution, strengthen relationships, synchronize business processes, organization, success
    
Salesforce.com
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more.
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp, gotcorp, got corporation
    
Campaigner
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more. 
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp, gotcorp, got corporation
    
Campaigner
Published By: Spredfast, Inc.     Published Date: Sep 23, 2013
5 Social Media Best Practices for Retail Brands
Tags : 
spredfast, social media, best practices for retail brands, marketing, audience targeting, retail brands
    
Spredfast, Inc.
Published By: Citrix     Published Date: Jun 03, 2015
Download now to uncover five things you need to do to get the right people in your webinars.
Tags : 
webinars, webinar
    
Citrix
Published By: Optify     Published Date: Aug 03, 2012
Learn how to maximize traffic and leads from your SEO efforts by choosing strategic keywords that align with your business goals and target audiences.
Tags : 
b2b, optify, seo, search engine optimization, lead generation, inbound marketing, search marketing, email marketing, emerging marketing, social media, internet marketing, e-commerce
    
Optify
Published By: Optify     Published Date: Aug 13, 2012
Learn how to maximize traffic and leads from your SEO efforts by choosing strategic keywords that align with your business goals and target audiences.
Tags : 
b2b marketing, keywords, seo, search engine marketing, keyword diversity, optify, inbound marketing
    
Optify
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: