target

Results 1 - 25 of 804Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
IBM SPSS predictive analytics solutions help uncover key predictors that lead to online student success or failure. Identifying specific issues early, target intervention measures for at-risk students, and take the appropriate steps to help improve online student graduation rates.
Tags : 
online education, online students, graduation rates, spss
    
Group M_IBM Q1'18
Published By: Pindrop Security     Published Date: Mar 21, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Workday     Published Date: Feb 27, 2018
For nearly a century, Denmark-based ALK has worked to improve the lives of people who suffer from allergies. As the global leader in allergy immunotherapy, the innovative pharmaceutical company is unique in its commitment to research-driven products and solutions that not only address allergy symptoms but also provide long-lasting relief by targeting the root causes. As a result of organic growth, acquisitions, and mergers, ALK has grown to more than 2,300 employees in 20 different countries. Its HR leaders knew they had to find an innovative solution that addressed the changing needs of the company. Temporary bolt-on systems were not going to work. Enter Workday.
Tags : 
workday, alk, innovation, company, organization, optimization
    
Workday
Published By: Workday Nordics     Published Date: Mar 06, 2018
For nearly a century, Denmark-based ALK has worked to improve the lives of people who suffer from allergies. As the global leader in allergy immunotherapy, the innovative pharmaceutical company is unique in its commitment to research-driven products and solutions that not only address allergy symptoms but also provide long-lasting relief by targeting the root causes. As a result of organic growth, acquisitions, and mergers, ALK has grown to more than 2,300 employees in 20 different countries. Its HR leaders knew they had to find an innovative solution that addressed the changing needs of the company. Temporary bolt-on systems were not going to work. Enter Workday.
Tags : 
    
Workday Nordics
Published By: FICO     Published Date: Mar 02, 2018
The role of analytics in managing, improving and ultimately transforming supply chains cannot be understated. But what about the analytics themselves? FICO’s Zahir Balaporia and renowned author Tom Davenport use the term “The Analytics Supply Chain” to reflect that the actual analytics themselves parallel supply chains, with inherent challenges and problems if things “get stuck.” Rethinking analytics in these terms can not only improve supply chain performance, but also any other business problems you seek to solve. This article targets: · Steps in the analytics supply chain and the vital role of data and analytic models · How your predictions, recommendations and insights need to rely on similar attributes to finished manufactured products; · Key questions to ask yourself in determining where you need to fix your analytics supply chain.
Tags : 
supply, chain, analytics, employee, optimization, organisations, productivity
    
FICO
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: Sitecore     Published Date: Jul 08, 2009
This whitepaper discusses the need to target outcomes and focus on building a complete, 360-degree view of your customers -- who they are, where they came from, what they do, and how you can best meet their needs.
Tags : 
sitecore, customer experience, lifecycle management, web content management, analytics, crm, emarketing, email marketing, cms, lead generation
    
Sitecore
Published By: Cyren     Published Date: Apr 12, 2018
Phishing is on the rise for several reasons-most fundamentally because it works. Phishing provides a robust ROI to the criminal gangs behind it, as barriers to entry have fallen and the "phishing-as-a-service" economy has evolved to lower costs and make it possible for even the non-technical aspiring criminal to get into the game. We also can't lose sight of the fact that phishing's primary distribution channel-email-is the easiest and only reliable way to reach business users directly. Cyren is uniquely positioned to observe, analyze, and halt phishing attacks as they happen. In this updated phishing issue, we explore recent rends in phishing, provide insight into the mind of a phisher, and examine the lifecycle of a phishing site. To begin to stern the increasingly negative impact of phishing, companies must continue the shift to cloud-based security with the kind of real-time detection and blocking of suspected zero-hour phishing sites that Cyren's security cloud provides.
Tags : 
cyber, threat, phishing, criminal, cyber, security
    
Cyren
Published By: Engagio     Published Date: Jan 10, 2018
Account-based strategy is the coordination of highly valuable, personalized experiences across all functions that impact the customer to drive engagement and conversion at a targeted set of accounts. The adoption of account-based strategy has accelerated in the last few years, with a dramatic increase in the number of companies looking to implement this approach. This growth is driving demand to “start now,” particularly in marketing organizations, but account-based cannot be developed by the marketing department alone. The best account-based leaders begin by securing organization-wide commitment to the account-based strategy.
Tags : 
    
Engagio
Published By: Ability Commerce     Published Date: May 18, 2009
As direct marketers, you know "the devil is in the details." Being able to drill-down on results is important to determine future strategies. It takes discipline and the application of direct marketing tenets. But you can fine-tune your results, target better and reap the rewards.
Tags : 
ability commerce, seo, email frequency, metrics, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: LSSiDATA     Published Date: Feb 05, 2010
New movers are ideal targets for Direct Marketers. New homeowners and renters invariably purchase a wide range of products and services. According to moving.com "People who are moving spend more during the 3 months surrounding their move than non-movers spend in 5 years."
Tags : 
lssidata, data, direct marketers, marketing, super consumers, new mover, clv, clec, firstconnex, line
    
LSSiDATA
Published By: Cadence9     Published Date: Jan 25, 2013
Content marketing is a marketing strategy fueled by the creation and sharing of content in order to attract, acquire and engage clearly defined target audiences.
Tags : 
    
Cadence9
Published By: TARGUSinfo.     Published Date: May 20, 2010
The arrival of 3rd party data is changing the landscape of online targeting. There is an influx of companies offering these services. But, what works with your business model? How do you evaluate the options? THE QUESTIONS YOU NEED TO KNOW AND WHY: • Is there high fidelity data? • Is the provided data stable? • Is your partner built to last? • Does your partner use a transparent methodology? Download our guide to evaluating data providers and find out the importance and relevance of these terms and conditions.
Tags : 
targus info
    
TARGUSinfo.
Published By: TargetMarketing     Published Date: Jun 04, 2010
You'll find in this complimentary report from Target Marketing, a breakdown of key segmentation areas, fundamental questions to ask to formulate effective segmentation plans, a six-step road map to a comprehensive segmentation process, three segmentation pitfalls to avoid, and more.
Tags : 
napco, target marketing, customer segmentation
    
TargetMarketing
Published By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : 
marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
    
ExactTarget
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
Download this asset to learn the volume and variety of data available today is creating new opportunities to improve your customers’ lives – from personalized recommendations to targeted advertising and intelligent services. Sponsored by: HPE and Intel®
Tags : 
best practices, intel, hpe, data, technology, opportunities, advertising, intelligent services, business technology
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
Consider the many ways that a customer encounters your brand – organic results on a search engine, display media campaigns, social media links, re-targeting on external sites, etc. One thing is certain – consumer journeys are far from linear. They can occur across multiple platforms, devices and browsers. The problem is that organizations are often constrained to channel-limiting decisions regarding their media investment allocations. Marketing attribution helps you analyze the impact and business value of company-generated marketing interactions to help make the best marketing investment decisions. The challenge is to interpret the massive volumes of customer data that continues to expand day by day.
Tags : 
    
SAS
Published By: Oracle     Published Date: Feb 24, 2015
Content marketing is driving the way marketing organizations are engaging their audiences. In our consumer-empowered world, it’s become more difficult for marketers to cut through clutter and a lot more challenging to garner loyalty with their audiences. That’s why smart content delivered in context will make you stand out in the crowd. Read the modern marketing essentials guide on Content Marketing now.
Tags : 
oracle, marketing cloud, essentials, content, strategy, business objectives, target audience, engagement, metrics, topics, categories, demand, promotion, data, awareness, sales, retention, business technology
    
Oracle
Published By: InsideView     Published Date: Aug 17, 2015
Whether you’re a marketer, a salesperson, or otherwise contributing to revenue growth, learning a few social selling techniques will help you fill your deal funnel with more–and better–leads. But it’s not as simple as creating a few tweets and browsing through LinkedIn. Put social media at the core of your lead-to-revenue process and get real tips you can use to grow revenue in our webinar, “5 Steps to Using Social Selling to Fill Your Funnel.” This short 30 minute webinar will show you how social selling will help you: Find the best targets Recognize “I’m ready to buy” signals Uncover relevant, real-time insights
Tags : 
    
InsideView
Published By: CrowdStrike     Published Date: Oct 23, 2017
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? A new white paper, “The Five Essential Elements of Next -Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: Details on the five essential capabilities that define true next-generation EPP and why they are so important A matrix that evaluates and compares the potential impact of different solutions A list of top questions to ask ve
Tags : 
    
CrowdStrike
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com