Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

targeting

Results 51 - 75 of 276Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is giving organizations the agility to respond quickly to demand for new products, services and applications. Many organisations begin their HCI journey by targeting specific use cases such as virtual desktop infrastructure, disaster recovery and remote office-branch office environments. But HCI continues to evolve far beyond these use cases. In this case study, we look at real world deployments to identify how HCI is helping businesses to reduce TCO, improve scalability and rapidly adopt new technologies. Please enter your details to view the case study.
Tags : 
    
VMware
Published By: Intel     Published Date: May 15, 2017
Read on to find out how to catch malicious activities targeting your critical assets, verify compliance, set early warning systems, and empower your existing tools with premium, contextual alerts.
Tags : 
threat detection, threat and vulnerability management, compliance, security, cyber security, cyber attacks
    
Intel
Published By: SAP     Published Date: Aug 22, 2018
Understanding and targeting customers is more important than ever before given the demand for individualized products, same-day or even one-hour delivery, and renting a service rather than buying a product.
Tags : 
sap, digital supply chain, supply chain management, supplier ecosystems, productivity
    
SAP
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: HERE Technologies     Published Date: Sep 26, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Dun & Bradstreet     Published Date: Feb 16, 2016
By 2017, 83% of all online advertising will be purchased programmatically, according to eMarketer. Don’t left behind. Download this informative eBook to learn why you should be investing in programmatic right now. Whether you're a beginner with a basic curiosity, or you have already executed a programmatic ad buy but you want to learn more, you'll discover exactly what programmatic is, why you need it, and how it works. Ultimately, you'll discover why Programmatic Matters. You’ll learn: • The key players in the programmatic ecosystem and how to work with them to execute a successful campaign • Why data is the key ingredient of programmatic • How to leverage targeting to your advantage
Tags : 
    
Dun & Bradstreet
Published By: HERE Technologies     Published Date: Sep 23, 2019
While the retail industry has made great stri des in understanding the online journeys of consumers, it has been difficult to observe and analyze their wh ereabouts and movements offline . Advanced location intelligence enables marketers to observe consumer journeys to within meters, whether indoors or outdoors, as they move ar ound ever - changing environments, such as stores, malls, restaurants, residential addresses, landmarks, and places of interest. This eBook explores how retailers are starting to launch more targeted campaigns by using location to understand consumer behavior. Find out why location intelligence ca n bring a wide range of benefits to the entire retail industry : data - driven audience segmentation, real - time location targeting, reduced ad - spend, enhanced campaign attribution, and more.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jul 19, 2018
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jul 19, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Aug 17, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and how you can harness the benefits and apply them to advertisement campaigns to attain more granular segmentation, precise targeting and a better audience experience. In this report by Counterpoint Technology Market Research, learn why HERE’s Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation, security, it management
    
Kaspersky Lab
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science, data management
    
Waterline Data & Research Partners
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Oracle Oracle Marketing Cloud     Published Date: Oct 20, 2015
Dieser leicht verdauliche Guide bietet eine Einführung in die 5 Säulen des Modern Marketing und zeigt Tipps für Marketer zur Automatisierung und Optimierung von Daten und Targeting, E Mail Marketing, Lead Nurturing und Scoring, Content Marketing und zu Abstimmung von Vertrieb und Marketing.
Tags : 
marketing automation, digital marketing, automation technology, modern marketing
    
Oracle Oracle Marketing Cloud
Published By: Oracle Oracle Marketing Cloud     Published Date: Oct 20, 2015
Lesen Sie diesen kleinen Guide über was Sie tun können, damit Ihre Webseiten und Whitepaper, Social Posts und Suchmaschinenoptimierung vorbereitet sind Ihrem Publikum den Weg zu zeigen, den es sucht.
Tags : 
targeting, clear targeting, customer engagement, gain audience, customer relationship, modern marketers
    
Oracle Oracle Marketing Cloud
Published By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
    
Lookout
Published By: Location3     Published Date: Feb 07, 2019
Each Location3 partner receives this customized approach as we work through the Local Search Roadmap, resulting in hyper-local optimizations targeting local consumers and queries. These efforts combine to increase online customer conversions and on-offline customer visits to your business.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local seo, local organic search, online visibility
    
Location3
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos
Published By: Intel     Published Date: Apr 16, 2019
Gartner predicts that the public cloud market will surpass USD 300 billion by 2021 . With the big players (Amazon, Google, Microsoft and IBM) taking home 63 percent of the market share , how will next wave CSPs stand out from the crowd? Download Intel's latest whitepaper, Differentiating for Success: A Guide for Cloud Service Providers' to discover how to offer unique services, including: - Providing workload-specific optimizations, for example machine learning or high-performance computing - Targeting a particular geographical area - Focusing on an industry, such as financial services - Delivering emerging technology, such as virtual reality, in-memory databases, and containerization
Tags : 
    
Intel
Published By: Oracle     Published Date: Jan 15, 2014
The latest IT tools and techniques can bring benefit to policy implementation in Government, as well as to administration and operations. This new role for IT can not only speed up the implementation of policy changes, but enable more effective targeting of those policies. This paper explains how. Oracle provides standard COTS software that can do this, and how such solutions have already been proven in Government Ministries.
Tags : 
oracle, government, cots software, smarter policy implementation, government ministries
    
Oracle
Published By: Cox Communications     Published Date: Nov 10, 2014
The waiting room experience at your business can make or break customer service. Customers not only feel special when they wait in style, it’s good for business too. You can give your hotel, retail store, auto repair shop, or other service-oriented business a big boost by customizing your waiting room to feature free Wi-Fi, TV or technology workspace.
Tags : 
wi-fi, business advantages, workspace utilization, targeting content, cox
    
Cox Communications
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.