targeted

Results 201 - 225 of 343Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: Zebra Technologies     Published Date: Oct 01, 2018
Enterprise vendors providing indoor location services must offer multiple technologies to satisfy diverse use cases. I&O leaders should evaluate vendors based on their ability to meet end-user granularity requirements and address the usage scenarios across the entire targeted vertical market.
Tags : 
    
Zebra Technologies
Published By: Engagio     Published Date: Jan 10, 2018
Account-based strategy is the coordination of highly valuable, personalized experiences across all functions that impact the customer to drive engagement and conversion at a targeted set of accounts. The adoption of account-based strategy has accelerated in the last few years, with a dramatic increase in the number of companies looking to implement this approach. This growth is driving demand to “start now,” particularly in marketing organizations, but account-based cannot be developed by the marketing department alone. The best account-based leaders begin by securing organization-wide commitment to the account-based strategy.
Tags : 
    
Engagio
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification
    
Qualys
Published By: Eloqua     Published Date: Sep 28, 2011
This white paper examines 5 key areas of integrated sales and marketing funnel economics, and provides examples of how marketing departments drive qualified sales opportunities and revenue that will affect how their organizations grow revenue.
Tags : 
sales funnel, targeted marketing, marketing white paper, revenue creation, lead management, revenue engine, funnel economics, lead conversion, qualified leads, dynamic content, identifying qualified opportunities
    
Eloqua
Published By: G/O Digital     Published Date: Nov 13, 2014
As an HVAC company, you have to understand how to connect your services to your targeted audience’s typical purchase cycle. You have to think about how your clients find you, where they are researching your specific services, and what prompts them to call your business versus your competitor. Download this guide for quick and easy steps to improve digital advertising for your local business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design
    
G/O Digital
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Oco, Inc.     Published Date: Nov 12, 2008
Many companies have business intelligence (BI) tools and infrastructure that serve their business’ needs; however, certain functional departments, business units, or key business initiatives often don’t yet have the BI tools that they need in place.  There is a new approach to BI to address those pressing business needs that leverages the existing BI infrastructure and can deliver value to the business in weeks rather than months and at a fraction of the cost of a traditional BI solution. Learn how Complementary BI leverages Software-as-a-Service (SaaS) BI solutions to address targeted business needs in a way that complements in-house BI systems, leading to a win-win situation for business users and IT analytical tools to business users.
Tags : 
oco, business intelligence, software-as-a-service, roi
    
Oco, Inc.
Published By: MoreVisibility     Published Date: Dec 19, 2017
Each year Digital Marketing becomes more targeted and the available products get more detailed in terms of data advertisers can leverage with targeting. With search engines getting more sophisticated and collecting more user data, it’s important to make these considerations within your marketing strategy. Digital Marketing has changed from a few search engines and display networks to now include Social Media platforms, internet radio, video, algorithmic buying, and more. With all of these new tactics available, how can a business decide what is right for them and which channels will be most effective? Here, we will define what it takes to create an effective Digital Marketing Strategy and how we can navigate this complex marketing channel.
Tags : 
    
MoreVisibility
Published By: Webtrends     Published Date: May 12, 2010
Whether you're new to email retargeting or a certified segmentation genius, Webtrends Email Exchange makes it easy to send timely, relevant and targeted emails based on your customers' web activity.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators
    
Webtrends
Published By: Webtrends     Published Date: May 05, 2010
You don't have to look far to find research that shows targeted marketing is most effective. Spray-and-pray tactics barely produce much more than annoyed customers.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: Webtrends     Published Date: May 18, 2010
Mobile marketing investments will likely triple over the next five years. In the haste to stake a claim in the mobile gold rush, many businesses skip the lessons learned from the last big push: to be successful, you'll need to measure and quantify your results with mobile analytics.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Yext     Published Date: Sep 03, 2014
The key to a mobile local campaign is the Mobile Local Landing page. Download this whitepaper to find out the 3 cornerstones to a successful Mobile Local Landing Page.
Tags : 
yext, marketing, internet marketing, mobile marketing, mobile local landing page, landing page, mobile local campaigns, user experience, call to action, location targeted ads
    
Yext
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: Impact Radius     Published Date: Oct 14, 2014
Affiliate marketing is big business and it is poised to grow to $4.5 billion by 2016! While affiliate marketing is growing and evolving, the best practices for this channel seem to be outdated and causing stagnating campaigns, weak affiliate relationships, and status quo sales metrics. Download this Whitepaper that outlines 10 new performance marketing best practices that will keep your affiliate program manageable, targeted, and profitable
Tags : 
    
Impact Radius
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks
Published By: Kenshoo     Published Date: Aug 07, 2012
TicketsNow knew that building an engaged fan base on Facebook would drive revenue for its business. Per a SocialCode survey from November 2011, Facebook fans are 291 percent more likely to engage and convert with a brand than non-fans. The challenge for TicketsNow was how to generate new fans in a targeted, efficient, and cost-effective manner.
Tags : 
kenshoo social, ticketsnow, case study, paid search, social media, customer engagement
    
Kenshoo
Published By: Mintigo     Published Date: Sep 05, 2018
Creating a data-driven, intelligent sales and marketing system is both today’s challenge and tomorrow’s imperative. Marketers can no longer live by “I think, I feel” and sales can no longer manage by “gut instinct.” Data is the new power currency in sales and marketing, and this is especially true if you want to succeed in an account-based marketing approach. Begin with the end in mind, use data and predictive intelligence to discover and target accounts and decision makers, create targeted content, select channels, deliver an omni-channel experience and measure results. This ebook will cover seven steps that every account-based marketer and seller should follow to create a successful process for ABM.
Tags : 
    
Mintigo
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library