RSS feed Get our RSS feed

News by Topic

value

Results 76 - 100 of 2833Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 03, 2017
Applying for and opening financial services accounts online is on the rise. And FSI marketers are feeling the pressure to make these new accounts higher quality. The Adobe guide, Acquisition Evolved, will give you three actionable ways to improve your ability to identify and convert high-value customers. Read the guide to learn: • The DNA of customer digital behavior • How to create unified customer segments with existing data • How to adopt onsite messaging to match offsite ads
Tags : fsi, adobe, customer behavior, customer segments, data
     Adobe
By: Adobe     Published Date: May 16, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
     Adobe
By: Adobe     Published Date: Nov 02, 2018
Digital asset management is the foundation for orchestrating unique customer experiences across channels. It’s time to rethink the strategic value for marketing.
Tags : 
     Adobe
By: Adobe     Published Date: Nov 02, 2018
Improving the customer experience is a strategic imperative for most organizations today, but delivering an engaging experience across the growing number of digital customer touch points can be a daunting challenge. Organizations must deliver responsive experiences that “play well” on smartphones, PCs, and tablets. They must publish content to installed app experiences on mobile and other connected devices, to social channels, and to email campaigns. They must manage global sites in different languages, localize the experience for different markets, and — increasingly — personalize the experience for different customer personas or segments. A modern digital experience management platform is essential for any organization hoping to make digital experience delivery a core competency. IDC interviewed organizations using Adobe Experience Manager Sites (AEM Sites) to understand the impact of the platform on their ability to create, manage, and deliver digital experiences. Study participants
Tags : 
     Adobe
By: Adobe     Published Date: Nov 09, 2017
IDC, a global market intelligence firm, studied the business value of the Adobe Primetime multiscreen TV platform. Bottom line? Over a five-year period, it delivered a 385% ROI and $14.3 million total benefits per organization. Download the report to learn more.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
It’s iconic. Concrete sails riding gentle waves. A million subtly textured tiles reflecting “the mood of the harbor.”1 The Sydney Opera House is recognizable by nearly everyone, a structure so loved and venerated it stands “alongside the Taj Mahal, the Acropolis, and the Great Pyramids” as a World Heritage site, “a cultural site having outstanding universal value.
Tags : 
     Adobe
By: ADP     Published Date: Nov 16, 2017
People are the most important part of your organization. Understanding what they do, how they do it, and even why they do it, provides invaluable insights for optimizing your processes, department, or entire organization. And as a business leader, in many ways you’ve never had it so good. There’s more people data available than ever before, and you’ve got the opportunity to put it to work through data-driven initiatives like changes to workforce demographics, employee retention, or benefits allocations. And most important, you have a chance to fuel business decision-making with smart workforce insights. Once you’ve learned how to turn your people data into real business value, you’ll create more visibility within your business, and everyone will see that the rewards of HR analytics are worth the effort. It’s time to take the opportunity to prove the value of data-driven HR. No more darkness. Otherwise, the only journey ahead is into some challenging pitfalls. We’ve identified five of t
Tags : 
     ADP
By: ADP     Published Date: May 04, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 18 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
     ADP
By: ADP     Published Date: May 16, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 27 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
     ADP
By: ADP     Published Date: May 16, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 27 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
     ADP
By: AdReady     Published Date: Aug 27, 2009
This white paper summarizes recent studies that demonstrate the value of online display advertising, and how search and display advertising used together can drive sales more effectively than either channel by itself.
Tags : search, banner, banner ads, search engine, adready, click-through rate, ctr, roi
     AdReady
By: AdRoll     Published Date: Oct 05, 2016
Personalize your marketing to convert your highest-value accounts. Account-based marketing (ABM) has become a popular term among business-to-business (B2B) marketers. The goal of ABM campaigns is quite simple: understand, identify, and target ideal customers with personalized messaging.
Tags : account based marketing, b2b marketing, search marketing, email marketing, emerging marketing, traditional marketing
     AdRoll
By: Aerohive     Published Date: Jun 15, 2015
Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.
Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
     Aerohive
By: Aerohive     Published Date: Oct 27, 2015
Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise
Tags : wlan, wi-fi, wireless networks, wireless architectures
     Aerohive
By: Ahead     Published Date: Jun 05, 2019
Digital transformation will fail without a commitment to automation - what AHEAD refers to as Relentless Automation. With the advent of public cloud and all of its promise, along with the ripple effect from the DevOps mantra of “automate everywhere”, technology teams must spin up new infrastructure, maintain configurations, and set up and tear down environments much faster than ever before. Of course, no one should automate for the sake of automating, or to simply be ahead of the curve. But while not every activity warrants automation - whether due to the complexity and nuance of the task, or its infrequent occurrence - Relentless Automation means identifying those tasks and processes where the benefits of automation outweigh both its upfront and recurring costs. Thankfully, the business benefits of standardizing and automating IT work are easy to spot: > Freeing up staff for higher value work > Reduction in errors and process variability > More auditability and accountability, helping
Tags : 
     Ahead
By: Akamai Technologies     Published Date: Aug 17, 2017
As mobile device usage has skyrocketed in recent years, mobile applications have emerged as the key engagement channel for businesses to connect with their most loyal and most valuable customers. Mobile app usage represents more than 85% of total mobile device time, and users now spend more time with apps than they do with television. But while app usage has increased more than 60% over the last two years, the number of apps each user actively engages with has remained fairly steady, at around 27 per month. This means users have a limited appetite for additional apps – but are heavily engaged with the ones they use. So while the mobile web gives businesses broad reach, mobile apps offer a robust link to their best customers. Users who value the company enough to go through the trouble of downloading and installing the app are a brand’s most engaged audience and loyal fan base.
Tags : mobile performance, mobile app, customer engagement, channeling
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
     Akamai Technologies
By: AKS-Labs     Published Date: Mar 20, 2007
Business professionals lack essential information about real-life metrics and information on how to build a Balanced Scorecard, which supports weights and scores, which allows calculating the performance values. This whitepaper is a Balanced Scorecard design toolkit, which contains some "how-to" ideas.
Tags : balanced scorecard, business analytics, business metrics, business intelligence, business integration, customer satisfaction, enterprise resource planning, scorecard
     AKS-Labs
By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics