targeted

Results 301 - 325 of 343Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : 
ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management, internet banking delivery
    
IBM
Published By: IBM     Published Date: Jan 13, 2009
The rapid growth of Web-based initiatives means organizations need to manage large amounts of targeted data. Existing enterprise content management (ECM) systems can be integrated with IBM Lotus Web Content Management software to help align accurate information with the people who affect your business. This white paper explains how.
Tags : 
ibm, web content management, enterprise content management, ecm, ibm lotus
    
IBM
Published By: IBM     Published Date: Apr 01, 2009
It's vital to check the health of your SOA Infrastructure.  This video depicts an SOA Implementation and the key SOA Infrastructure Diagnostic and Treatment areas targeted by an SOA Healthcheck.
Tags : 
soa, ibm ebf, service oriented architecture, healthcheck, diagnostic, it infrastructure, soa treatment, soa healthcheck
    
IBM
Published By: ServicePower     Published Date: Jul 03, 2007
Technology can prove to be a vital component in the quest for service profitability. However, there is a lot of technology out there targeted at field service organizations which has evolved to the point where its introduction in customer-facing functions can significantly enhance organizational productivity.
Tags : 
customer experience, customer service, productivity, sales automation, marketing automation, messaging, servicepower, service chain
    
ServicePower
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile
    
PKWARE
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection
    
Third Brigade
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more. 
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp
    
Campaigner
Published By: SchemaLogic     Published Date: Jun 11, 2008
The Associated Press, like all publishing and digital media companies, must work rapidly to meet the demands of a shifting media landscape. An exploding wave of free content on the web meant that AP not only had to deliver more content online, but needed to create more relevance and niche content in order to update traditional ad revenue models with targeted web-based products and more potential for advertising dollars.
Tags : 
schemalogic, associated press, content delivery, content management, cms, content management system
    
SchemaLogic
Published By: Bronto     Published Date: Jan 03, 2013
Shar Music targeted personalized offers based on past order history, preferred product category and towards top customers. Using this targeted communication, response and conversion rates increased.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: Godfrey     Published Date: Oct 24, 2008
Many B2B marketing professionals are happy with a 2% response on their mailings. Others are thrilled to get a 0.5% click-thru-rate on their email marketing campaign. If that’s you, you are probably using mass direct marketing techniques; not the relationship marketing possible with today’s targeted direct marketing technologies.
Tags : 
godfrey, click-thru-rate, email marketing campaign, targeted mailing approach, direct marketing plan, b2b direct marketing
    
Godfrey
Published By: Neolane, Inc.     Published Date: Sep 23, 2010
Mass mailing, mass emails or SMS blasts - ask any business to consumer(B2C) marketing professional what they think of them and they will probably tell you there's been a shift away from such indiscriminate approaches in favor of more targeted campaigns. And they'll tell you that the main reason for this shift is that customers are more demanding; asking to be recognized as individuals and expecting communications to be relevant to their unique lifestyles, wants and needs.
Tags : 
neolane, marketing fatigue, b2c, sms, email, mass mail, marketing
    
Neolane, Inc.
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans.
Tags : 
messagelabs, symantec hosted services, malware, trojan attack, email guard, spam
    
Symantec.cloud
Published By: IBM Software     Published Date: Feb 11, 2011
This white paper explores how predictive analytics helps marketing organizations increase ROI by executing highly targeted campaigns focused on high revenue-generating customers and prospects.
Tags : 
ibm cognos, predictive analytics, marketing campaign management system, roi, customer behaviour
    
IBM Software
Published By: SAS     Published Date: Mar 20, 2013
How Vail Resorts Is Redefining Targeted Marketing with the Help of SAS®
Tags : 
customer experience, crm, relationship management, marketing, customer intelligence, customer data, analytics
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
New analytics tools and services are helping organizations extract exceptional business value from the massive volumes of available data provided by various internal and external sources. Many companies are harnessing these insights to improve operational and business processes, troubleshoot problems, identify business opportunities, and generally compete and innovate better. Now the benefits of analytics in those areas are prompting companies to look to analytics to improve information security. Enterprise security organizations are under tremendous pressure to change. Traditional perimeter-focused security controls and strategies have proved inadequate against modern, highly targeted attack campaigns.
Tags : 
best practices, technology, security, enterprise, analytics
    
SAS
Published By: IBM Software     Published Date: Jun 08, 2011
This white paper explores how predictive analytics helps marketing organizations increase ROI by executing highly targeted campaigns focused on high revenue-generating customers and prospects.
Tags : 
ibm cognos, predictive analytics, marketing campaign management system, roi, customer behaviour
    
IBM Software
Published By: Adobe     Published Date: Aug 22, 2013
Think targeting ticks customers off? Actually, it's quite the opposite. Studies show that 41% of consumers would consider ending a brand relationship because of irrelevant messaging. That's why targeted and personalized content is more important now than ever before. Download this paper for 32 insightful tips to help you stay ahed of the competition, so you can make 2013 your most successful and profitable year ever.
Tags : 
consumer targeting, targeting, brand messaging
    
Adobe
Published By: FireEye     Published Date: Sep 11, 2012
Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks
Tags : 
cyber attacks, it security, targeted attacks, malware
    
FireEye
Published By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption, business continuity
    
Mimecast
Published By: Semcasting     Published Date: Feb 14, 2013
This White Paper illustrates three important lessons learned as a result of executing highly targeted campaigns for 36 elected offices in November of 2012.
Tags : 
hyperlocal targeting, hyper-local targeting, location-based targeting, hyperlocal advertising, hyper-local advertising, digital marketing, ip address targeting, ip geo targeting
    
Semcasting
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: IBM     Published Date: Nov 05, 2013
We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have “set a high bar” in the way they engage customers throughout the entire sales process—not just during the commercial transaction, but before, during and after the transaction. Your operations must be seamless, because individuals enjoy an interconnected and ubiquitous experience. And your operations must be insightful, because every personal and professional interaction is targeted and relevant. A Smarter Process approach helps you to reinvent business operations in the era of the customer.
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan
    
IBM
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: IBM     Published Date: Apr 22, 2014
Learn how your business can push targeted campaigns across your mobile, tablet and desktop websites in minutes in this interactive demo.
Tags : 
ibm, emm, smartphone, mobile, push notifications, push marketing, targeted campaigns, mobile device
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library