RSS feed Get our RSS feed

News by Topic

media intelligence

Results 1 - 25 of 62Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : cyber security, global threat intelligence, malware prevention, cyber threat, protection
     IBM
By: HPE     Published Date: Mar 23, 2015
With new technologies, new opportunities often emerge, especially in business. The advent of innovations, such as social media and mobile devices, is changing the ways businesses interact with customers and the ways in which customers desire to be engaged. Opportunities arising from the benefits of salesforce automation, business intelligence (BI), and customer relationship management (CRM) applications are providing new levels of insight, helping businesses acquire customers more efficiently and retain those customers longer. As a direct result, organizations that invest in better understanding potential customers are likely to see higher returns than those organizations that possess a more limited understanding of their customer base. Seeking the competitive advantage resulting from improved customer focus, IT organizations have increased investment in business intelligence and analytics and the underlying infrastructure to support those applications.
Tags : 
     HPE
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: Adobe     Published Date: Apr 30, 2014
Social media is rising beyond just likes and retweets. Social media continues to shape the digital marketplace with how brands can engage their consumer. Whether its through a sponsored link on Twitter, an inline ad with Facebook, or retail placement on Pinterest, an understanding of the current trends will go a long way to producing a successful social media marketing campaign.
Tags : adobe, abode media optimizer, social intelligence, facebook, twitter, social media marketing, marketing, consumer engagement
     Adobe
By: Juniper Networks     Published Date: Oct 20, 2015
In today’s world, your firewall must be able to take immediate action based on known or emerging intelligence.
Tags : juniper, cloud, data center, security intelligence, security, storage
     Juniper Networks
By: Sprinklr     Published Date: Nov 22, 2016
A quick fact sheet that details the reach and audience of major messaging apps to help companies know which platform would be best suited to their audience.
Tags : messaging app research, messaging app data, social media data, social media intelligence, snapchat data, snapchat statistics, wechat data, wechat statistics
     Sprinklr
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : rsa, emc, security, operations center, threat, threat detection, intelligence-driven
     RSA Security
By: Topsy     Published Date: Jul 16, 2013
Marketing today is real-time, always-on, pervasive, and constant—but following these 5 simple rules guarantees that you’ll stand out from the crowd.
Tags : twitter, advertising, real-time, realtime marketing, real-time marketing, social marketing, social strategy, social listening
     Topsy
By: Cisco     Published Date: Jan 21, 2015
Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.
Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
     Cisco
By: Cisco     Published Date: Jan 21, 2015
Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.
Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
     Cisco
By: Adobe     Published Date: Mar 03, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals. The Adobe guide, Play to Win in Audience Intelligence, shows you how. Read the guide to learn: • How to bring your data sources together into a unified view of the customer • How to move beyond basic demographic attributes to behavior attributes • How to use look-alike modeling to improve customer targeting and acquisition
Tags : audience intelligence, audience engagement, unified data source, behavior attributes, look-alike modeling, customer experience/engagement
     Adobe
By: EMC Corporation     Published Date: Mar 20, 2014
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
     EMC Corporation
By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
     Brandwatch
By: Brandwatch     Published Date: Jun 17, 2013
An introduction to using social media in business, this eBook discusses the importance of setting social media goals and how to foster a positive brand experience, along with tips to become a thriving social enterprise.
Tags : social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
     Brandwatch
By: Brandwatch     Published Date: Jun 17, 2013
Consumers now expect good customer service via social media…so Brandwatch analyzed 40 leading brands to see which brands were delivering the best social customer service.
Tags : social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
     Brandwatch
By: Brandwatch     Published Date: Jun 20, 2013
For Sky News Arabia, using social media monitoring & analytics to “sense-and-respond” to viewers is a critical component to increasing viewer-to-viewer engagement and gaining extended market reach in an established market.
Tags : social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
     Brandwatch
By: Brandwatch     Published Date: Jun 20, 2013
In this report, we examined the online conversations around Fashion Week in New York, London, Paris and Milan to find out exactly what makes fashion enthusiasts and buyers tick—and reveal trends and insights to help make fashion brands smarter.
Tags : social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
     Brandwatch
By: Interactive Intelligence     Published Date: Dec 02, 2010
How a contact center deploys and manages eServices - non-voice interaction channels such as email, chat, SMS and social media - is the key to offering electronic services that attract modern tech-savvy customers. Learn about eServices best practices from Sheila McGee-Smith, founder of McGee-Smith Analytics, and Tim Passios, Director of Solutions Marketing at Interactive Intelligence, and how three diverse companies successfully utilize eServices to their advantage.
Tags : interactive intelligence, sms, media channel, short message service, wireless, mobile communications, gsm, social media
     Interactive Intelligence
By: IBM     Published Date: Jan 18, 2013
In this new white paper by Peppers & Rogers Group and IBM, readers will learn how to harness customer insight from myriad interactions to profitably grow revenue, increase loyalty, and go from good to exceptional.
Tags : analytics, social media, best practices, crm, marketing, business intelligence, web analytics, reputation monitoring
     IBM
By: Adobe     Published Date: Apr 17, 2014
Social media is more than friends and likes, tweets and followers, pins and mentions. According to the Q4 2013 Adobe Digital Index Social Intelligence Report, it’s time for marketers to take social advertising seriously. With higher click-through rates and lower prices, the pressure is on to bring social into your overall media mix. Adobe can help manage, forecast, and optimize all your ads.
Tags : adobe, social intelligence, social media, social media marketing, social advertising, click through rate, ctr, digital marketing
     Adobe
By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data
     Cyveillance
By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
     Lumension
By: Brandwatch     Published Date: Aug 23, 2016
This whitepaper offers an inside look into how social consumer market insights work at the world’s biggest brands and agencies.
Tags : social media, consumer insights, market research, b2b marketing, consumer market insights, social data, social insights, social listening
     Brandwatch
By: Brandwatch     Published Date: Aug 23, 2016
As the consumer technology industry continues to grow and innovate, it becomes difficult for brands to stay at pace with expectations of their customers. Social media intelligence offers brands the ability to acquire important insights about both consumers and the market. This report summarizes key benchmarks and provides important insights regarding the state of social among the consumer technology industry.
Tags : social media, consumer technology, social listening, b2b marketing, social data, social insights, consumer insights, social intelligence
     Brandwatch
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics