Whitepaper Library
 

targeting

Results 1 - 25 of 220Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Workday     Published Date: Feb 27, 2018
For nearly a century, Denmark-based ALK has worked to improve the lives of people who suffer from allergies. As the global leader in allergy immunotherapy, the innovative pharmaceutical company is unique in its commitment to research-driven products and solutions that not only address allergy symptoms but also provide long-lasting relief by targeting the root causes. As a result of organic growth, acquisitions, and mergers, ALK has grown to more than 2,300 employees in 20 different countries. Its HR leaders knew they had to find an innovative solution that addressed the changing needs of the company. Temporary bolt-on systems were not going to work. Enter Workday.
Tags : 
workday, alk, innovation, company, organization, optimization
    
Workday
Published By: Workday Nordics     Published Date: Mar 06, 2018
For nearly a century, Denmark-based ALK has worked to improve the lives of people who suffer from allergies. As the global leader in allergy immunotherapy, the innovative pharmaceutical company is unique in its commitment to research-driven products and solutions that not only address allergy symptoms but also provide long-lasting relief by targeting the root causes. As a result of organic growth, acquisitions, and mergers, ALK has grown to more than 2,300 employees in 20 different countries. Its HR leaders knew they had to find an innovative solution that addressed the changing needs of the company. Temporary bolt-on systems were not going to work. Enter Workday.
Tags : 
    
Workday Nordics
Published By: TARGUSinfo.     Published Date: May 20, 2010
The arrival of 3rd party data is changing the landscape of online targeting. There is an influx of companies offering these services. But, what works with your business model? How do you evaluate the options? THE QUESTIONS YOU NEED TO KNOW AND WHY: • Is there high fidelity data? • Is the provided data stable? • Is your partner built to last? • Does your partner use a transparent methodology? Download our guide to evaluating data providers and find out the importance and relevance of these terms and conditions.
Tags : 
targus info
    
TARGUSinfo.
Published By: SAS     Published Date: Jan 17, 2018
Consider the many ways that a customer encounters your brand – organic results on a search engine, display media campaigns, social media links, re-targeting on external sites, etc. One thing is certain – consumer journeys are far from linear. They can occur across multiple platforms, devices and browsers. The problem is that organizations are often constrained to channel-limiting decisions regarding their media investment allocations. Marketing attribution helps you analyze the impact and business value of company-generated marketing interactions to help make the best marketing investment decisions. The challenge is to interpret the massive volumes of customer data that continues to expand day by day.
Tags : 
    
SAS
Published By: B Channels     Published Date: May 01, 2018
All technology companies are continuing their investment in IoT technologies: targeting technology verticals or market segments like Smart Homes or IIoT. They all need partners and alliances to expand in these verticalized markets. This post looks at who, where and the implications of IoT expansion.
Tags : 
    
B Channels
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
    
Kaspersky Lab Australia and New Zealand
Published By: Acxiom Corporation     Published Date: Mar 12, 2014
In July 2013 Acxiom commissioned Forrester Consulting to evaluate how companies use the data they collect from their customers to make better decisions on their marketing campaigns by gauging their experiences and attitudes around their use of and future vision for using customer data across multiple marketing channels. In order to understand this topic, we conducted interviews with 11 executives representing a range of roles and perspectives, including consumer packaged goods companies, financial services organizations, and agencies.
Tags : 
acxiom, forrester, data, marketing, marketing campaigns, cross channel, customer data, market research, targeting, data analytics, life cycle management
    
Acxiom Corporation
Published By: Acxiom Corporation     Published Date: Mar 12, 2014
If you are responsible for online advertising, this report is going to change the way you look at your banner ads forever. It did for us. But, step one on the road to this transformation was deciding exactly what to measure. Download this whitepaper to learn about a new measurement approach that proves banner ads boost offline sales.
Tags : 
acxiom, marketing, measurement, banner ads, display advertising, targeting, marketing campaigns, marketing analytics, data analytics, online engagement
    
Acxiom Corporation
Published By: Akamai Technologies     Published Date: May 08, 2017
• Our survey of companies that currently offer, or plan to launch, so-called “direct to consumer,” or over-the-top (OTT), video services in the market suggests that the industry is maturing. Though 51 percent of those surveyed view their video service as a money-making venture, 49 percent see it as providing some other primary benefit to the company. Not only are the types of OTT video services offered to consumers becoming more diverse, but the marketing and distribution are also improving such that target audiences are more likely to find new services intended for them
Tags : 
video services, akamai, marketing, distribution, audience targeting, service optimization
    
Akamai Technologies
Published By: Adobe     Published Date: Nov 07, 2013
One of the key objectives of Adobe’s current advertising campaign is to explode the myth that ‘managing websites is hell’. We believe that in this day and age, the idea that website management is a nightmare should be a thing of the past.
Tags : 
adobe, econsultancy, trends and innovation, content management, customer experience management, driving engagement, brand-building, web content management, wcm, adobe experience manager, adobe marketing cloud, the cloud, cloud computing, social community, econsultancy and adobe, driving sales, multichannel customer experience, digital intelligence, targeting, segmentation
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Today’s leading DMPs are ingesting a wide range of owned and licensed data streams for insights and segmentation and are pushing data into a growing number of external targeting platforms, helping marketers deliver more relevant and consistent marketing communications.
Tags : 
adobe, the forrester wave, forrester dmp wave, audience management, data management platforms, multi-touchpoint targeting, multi-touchpoint execution, dmp vendor offerings, seamless data ingestion, message delivery, strong vendors, product evaluations, selecting right partner, audience insights, coordinated targeting
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Honda uses Adobe Social to effectively engage European fans of cars, motorcycles, robots, jets, and other inventive products through a single, coordinated effort
Tags : 
adobe, honda motor, social media, brand governance, aodbe social, inventive products, coordinated effort, social communities, targeted experiences, using resources effectively, coordinate marketing campaigns, social media management platform, localized apps, international blockade, global campaign coordination, social analytics, local marketers, digital marketing, targeting publishing, social media quality
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Think targeting ticks customers off? Actually, it’s quite the opposite. Studies show that 41% of consumers would consider ending a brand relationship because of irrelevant messaging.1 That’s why targeted and personalized content is more important now than ever before.
Tags : 
adobe, testing and targeting, targeted content, personalized content, target segments, targeting tips, important target facts, targeted campaigns, noticeable page elements, segment preferences, alternate content, control content, testing organizations, optimal end conversion, dynamic banners, quick attraction, device usage, test designs, define segments
    
Adobe
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft
    
VMware
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Adobe     Published Date: Feb 03, 2015
The 2015 Digital Trends report, published by Econsultancy in partnership with Adobe explores different new digital trends such as customer experience, CX and content marketing, data-driven business, targeting and personalisation, mobile, cross-channel marketing and content optimisation.
Tags : 
digital trends, marketing digital and ecommerce trends, customer experience, content marketing, targeting and personalisation, mobile trends, marketing and content optimisation
    
Adobe
Published By: Evariant     Published Date: Sep 07, 2016
The physician liaison position is a relatively new one for most health systems, but individuals hired as physician liaisons are being held accountable for facilitating impactful, fast change. Where marketing drives incremental revenues by targeting patients and consumers (non-patients), physician liaisons drive incremental revenues by cultivating relationships with physicians and improving referral behavior.
Tags : 
evariant, physician liaison, hospital, physician alignment
    
Evariant
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.