Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

media intelligence

Results 1 - 25 of 72Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Apr 17, 2014
Social media is more than friends and likes, tweets and followers, pins and mentions. According to the Q4 2013 Adobe Digital Index Social Intelligence Report, it’s time for marketers to take social advertising seriously. With higher click-through rates and lower prices, the pressure is on to bring social into your overall media mix. Adobe can help manage, forecast, and optimize all your ads.
Tags : 
adobe, social intelligence, social media, social media marketing, social advertising, click through rate, ctr, digital marketing
    
Adobe
Published By: Adobe     Published Date: Apr 30, 2014
Social media is rising beyond just likes and retweets. Social media continues to shape the digital marketplace with how brands can engage their consumer. Whether its through a sponsored link on Twitter, an inline ad with Facebook, or retail placement on Pinterest, an understanding of the current trends will go a long way to producing a successful social media marketing campaign.
Tags : 
adobe, abode media optimizer, social intelligence, facebook, twitter, social media marketing, marketing, consumer engagement
    
Adobe
Published By: Adobe     Published Date: Aug 02, 2017
With Adobe Analytics and Adobe Audience Manager—both part of Adobe Marketing Cloud—media companies can overcome today’s audience intelligence challenges. Adobe Analytics is an industry-leading solution for applying real time analytics and detailed segmentation across all of your marketing channels. A unified platform and customer ID unlock powerful customer intelligence and help you discover and retain high-value audiences. Make forward-looking decisions with its predictive intelligence capabilities, and find out which of your marketing efforts are paying off with its attribution functionality.
Tags : 
goals and kpis, data warehouse, resource management, insight loop, content and campaigns, audience optimisation
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals. The Adobe guide, Play to Win in Audience Intelligence, shows you how. Read the guide to learn: • How to bring your data sources together into a unified view of the customer • How to move beyond basic demographic attributes to behavior attributes • How to use look-alike modeling to improve customer targeting and acquisition
Tags : 
audience intelligence, audience engagement, unified data source, behavior attributes, look-alike modeling
    
Adobe
Published By: Adobe     Published Date: May 15, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
    
Adobe
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: AWS     Published Date: Jul 24, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
    
AWS
Published By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 17, 2013
An introduction to using social media in business, this eBook discusses the importance of setting social media goals and how to foster a positive brand experience, along with tips to become a thriving social enterprise.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 17, 2013
Consumers now expect good customer service via social media…so Brandwatch analyzed 40 leading brands to see which brands were delivering the best social customer service.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 20, 2013
For Sky News Arabia, using social media monitoring & analytics to “sense-and-respond” to viewers is a critical component to increasing viewer-to-viewer engagement and gaining extended market reach in an established market.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 20, 2013
In this report, we examined the online conversations around Fashion Week in New York, London, Paris and Milan to find out exactly what makes fashion enthusiasts and buyers tick—and reveal trends and insights to help make fashion brands smarter.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide provides a number of helpful tips for an effective evaluation of campaign activity, including: • How to distinguish between measurement types • An in-depth view on campaign measurement frameworks and dashboards • Common campaign objectives
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns
    
Brandwatch
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide features tips, tricks and case studies to help you learn how to identify and utilize influencers, including: • How influencer marketing works • Working examples from a variety of brands • How to evaluate and measure the success of your influencer campaigns
Tags : 
social media, social analytics, social media monitoring, influencer marketing, influencer campaigns, social listening, social business intelligence, social media management
    
Brandwatch
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring
    
Brandwatch
Published By: Brandwatch     Published Date: Apr 22, 2015
Download this case study to learn how agency DDB was able to use Brandwatch’s powerful coverage and flexible filtering capabilities to measure the success of its new Game of Thrones campaign.
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns
    
Brandwatch
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.