target

Results 976 - 1000 of 1061Sort Results By: Published Date | Title | Company Name
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection, business technology
    
Arbor
Published By: Turn     Published Date: Mar 13, 2013
Tech for Cross-Channel Ad Targeting
Tags : 
cross-channel ad targeting, advertising strategy, real-time bidding, digital marketing
    
Turn
Published By: Turn     Published Date: Mar 13, 2013
3 Keys to Look-Alike Modeling
Tags : 
look-alike modeling, targeting, predictive modeling, predictive models, advertising strategy
    
Turn
Published By: Dell SecureWorks     Published Date: May 28, 2013
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
Tags : 
security
    
Dell SecureWorks
Published By: IBM     Published Date: Nov 05, 2013
We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have “set a high bar” in the way they engage customers throughout the entire sales process—not just during the commercial transaction, but before, during and after the transaction. Your operations must be seamless, because individuals enjoy an interconnected and ubiquitous experience. And your operations must be insightful, because every personal and professional interaction is targeted and relevant. A Smarter Process approach helps you to reinvent business operations in the era of the customer.
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management
    
IBM
Published By: CEB     Published Date: Sep 04, 2013
Analysis on the key challenges, developments, and innovations affecting corporate and business finance. This edition helps you to compare your cost and growth assumptions with peers, establish a finance-friendly corporate culture, develop critical guidance-based skills on your team, mobilize global cash balances, increase the effectiveness of investor targeting, and improve business analytics.
Tags : 
corporate culture, thought leadership, finance talent, cash balances, investor targeting, finance outlook, business analytics
    
CEB
Published By: Oracle     Published Date: Nov 05, 2013
The key is knowing your target audience and creating video content relevant to them. This paper provides some key insights into how you can maximize your video’s effectiveness in social streams.
Tags : 
branding, branded video posts, video posts, multimedia, engagement, audience targeting, video content, social media, branding
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: IBM     Published Date: Apr 22, 2014
Learn how your business can push targeted campaigns across your mobile, tablet and desktop websites in minutes in this interactive demo.
Tags : 
ibm, emm, smartphone, mobile, push notifications, push marketing, targeted campaigns, mobile device, tablet, desktop website, customer engagement, mobile applications
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Customer intelligence solutions that can enhance customer retention by leveraging advanced and predictive analytics tools to help enable more targeted sales, service and marketing plans. .
Tags : 
ibm, insurance, customer intelligence, solutions, retention, analytics
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
For banks today, having more ways to communicate with customers is a good thing. But it has also made it harder for banks to figure out where and how to most profitably commit their marketing resources. Leveraging predictive analytics, First Tennessee Bank is applying the ultimate acid test. It’s combining a granular understanding of the needs of customer segments with real P&L data to optimize its marketing spend, focusing on programs that deliver the highest ROI. First Tennessee’s ability to target its campaigns more intelligently has increased its response rate by 3.1 percent, cut key marketing costs by nearly 20 percent and enables the bank to get the most from its resources.
Tags : 
ibm, banking, analytics, roi, marketing, p&l, data
    
IBM
Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking, security
    
Cisco
Published By: HP     Published Date: Jun 03, 2014
The early days of the de-duplication target market could be characterized as the Wild West according to 451 Research, with a slew of startups shooting it out in an emerging market with tremendous potential. That phase was followed by a consolidation phase where the big guns acquired startups in a buy-is-better-than-build spree. A few smaller companies remain, but it's becoming increasingly clear that the disk-based de-duplication market will likely be dominated by a few large players. 451 Research thinks that HP, although coming from behind, has a good chance of joining those ranks because of the single-product approach to end-to-end de-duplication in its homegrown StoreOnce software, which for the time being, appears to have the performance advantage.
Tags : 
hewlett packard, de-duplication, storeonce, data management
    
HP
Published By: Adobe     Published Date: Jul 08, 2015
Marketers use A/B testing to deliver the most optimized and targeted experiences for their customers. Sometimes marketers encounter pitfalls that produce misleading findings, which lead to less efficient offers and lower conversion rates. Read Nine Common A/B Testing Pitfalls and How to Avoid Them to: -Recognize the nine most significant A/B testing pitfalls -Discover the five steps to gain better testing results -Gain a deeper understanding of test results
Tags : 
test, target, business objectives, segmentation, pitfalls
    
Adobe
Published By: Adobe     Published Date: Feb 22, 2016
Customer experience has officially taken center stage in 2016. Adobe partnered with Econsultancy to bring you the 2016 Digital Trends report. After surveying 7,000 marketing professionals, it’s clear that marketers are more focused than ever on creating relevant and contextually targeted customer experiences.
Tags : 
adobe, digital trends, econsultancy, monitization, engagement, mobile
    
Adobe
Published By: Adobe     Published Date: Sep 20, 2016
Marketers use A/B testing to deliver the most optimized and targeted experiences for their customers. Sometimes marketers encounter pitfalls that produce misleading findings, which lead to less efficient offers and lower conversion rates. Read Nine Common A/B Testing Pitfalls and How to Avoid Them to: Recognize the nine most significant A/B testing pitfalls Discover the five steps to gain better testing results Gain a deeper understanding of test results
Tags : 
adobe, ab testing, marketing, marketer, targeted marketing
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Adobe is a leader in personalization engines, according to Gartner. Why Should the Target Audience Care? Finding the right personalisation engine can have a dramatic impact on an organisation’s ability to provide quality, personalised experiences to their clientele. Gartner is a prestigious and respected organisation. Marketers and IT can rely on them to help make make crucial decisions about the best providers to use. Supporting Concepts Gartner conducted an extensive, multi-criteria evaluation of personalisation engines. They researched, analyzed, and scored the most significant ones, in order to help businesses make the right choice of provider. KEY POINTS PROVIDED AS GUIDELINES Adobe is a Leader. Many of Adobe's products include personalization features. However, Adobe Target offers a stand-alone personalization engine for segmentation, optimization and recommendations, and can be integrated with third-party platforms for marketing or digital commerce personalization. M
Tags : 
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Epicor     Published Date: Aug 22, 2018
In the world of retail, the only returns you want are returns on your business investments. With Epicor Eagle N Series, you get precisely that—a tool that is engineered to go the distance, hit revenue and profit targets, keep customers coming back, and deliver great returns on your technology investment. The latest technology advances, and higher customer expectations, make it critical to have a solution in place meets your business goals and your customer’s needs. This eBook details seven way you can make your Point of Sale system deliver growth and profits including-- • Easy-to-use inventory management tools • Ability to streamline and simplify everyday processes • Keep customers coming back with customized loyalty programs Download the eBook and take advantage of the years of experience Epicor has providing technology for retailers and understanding their needs.
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.