tech target

Results 126 - 145 of 145Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Oct 18, 2017
With the support of SAS, the Internet of Things Institute developed the 2017 Internet of Things ROI Research Study to gather real-world insights, lessons learned and future guidance from current users of IoT technology and advanced analytics. This selective sample of IoT users offers valuable insights to both IoT innovators and organizations still waiting to see how the technology evolves before investing. Multiple business layers and functions have input into IoT decision making. Discover which layer was most critical to success for those organizations that have achieved the highest percentage of their targeted ROI. Learn about the main drivers of success for IoT users achieving higher returns. Lastly, the results highlight six primary factors that can undermine an IoT initiative and how they can be prevented.
Tags : 
     SAS
By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: Radius Intelligence     Published Date: Jun 15, 2015
Over the past few decades, marketing has evolved from a hunch-based and immeasurable practice to one driven by data, analytics, and software. Marketers now work with advanced software and myriad channels to identify new prospects. However, today’s marketers face new challenges. This guide will dive deep into those challenges, identify key trends, and introduce the concept of marketing intelligence.
Tags : predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
     Radius Intelligence
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
     F5 Networks Singapore Pte Ltd
By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : encryption, data, key, cloud, bits, keys, ciphertext, entropy
     Rubrik EMEA
By: Mimecast     Published Date: Nov 26, 2018
If you are among the IT professionals feeling a little uneasy about relying solely on the email security provided by Microsoft in Office 365™, you are not alone. Here’s the good news, you can regain the same sense of security that you had when you were managing email servers on-premises with the right third-party solution. TechTarget summarizes how you can easily and effectively realize the benefits of Office 365 with a complementary third-party solution that can not only mirror the kind of layered security built for on-premises solutions, but also ensure uninterrupted access to Office 365 email, even if it crashes.
Tags : 
     Mimecast
By: Dassault Systèmes     Published Date: Jun 19, 2018
As more companies compete for business, Original Equipment Manufacturers (OEMs) increasingly demand higher production rates and greater production flexibility from suppliers. If smaller-sized companies want to compete, they need the right tools and latest technology. NC Machining manufactures should ask three primary questions when considering the tools to improve competitiveness and implement Lean practices: • Do the tools provide the means for improved collaboration between engineering and manufacturing, and incorporate manufacturing best practices? • Can all data and program information reside in one database or platform that is accessible concurrently by all enterprise stakeholders—from design engineering to the shop floor? • Is it possible to perform real-time multi-disciplinary simulations to improve performance and manufacturing targets? Discover how to optimize your NC Machine Shop Production, minim
Tags : 
     Dassault Systèmes
By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
     Illusive Networks
By: Godfrey     Published Date: Oct 24, 2008
Many B2B marketing professionals are happy with a 2% response on their mailings. Others are thrilled to get a 0.5% click-thru-rate on their email marketing campaign. If that’s you, you are probably using mass direct marketing techniques; not the relationship marketing possible with today’s targeted direct marketing technologies.
Tags : godfrey, click-thru-rate, email marketing campaign, targeted mailing approach, direct marketing plan, b2b direct marketing
     Godfrey
By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : proxy deployment, firewall, threat detection, threat protection
     Symantec
By: IBM Software     Published Date: Nov 02, 2010
Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy, and saving time and resources.
Tags : ibm cognos predictive analysis, data mining, insurance fraud detection, analytical technique, prevention
     IBM Software
By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : data, mining, detect, insurance, fraud, insurers, fraudulent, claims
     IBM
By: Gleanster Research     Published Date: Oct 22, 2013
This Deep Dive from Gleanster research will explore why some marketing technologies may not be the best solution for distributed marketers and how an merging class of technology called “local marketing automation” is enabling corporate marketing to oversee brand consistency and simultaneously give local marketers autonomy and control over communications to their local target audiences.
Tags : 
     Gleanster Research
By: VMware AirWatch     Published Date: Oct 27, 2016
Hear how leading hospitals are using the Digital Clinical Workspace as a platform for innovation to improve the patient and provider experience, and enable the right device at the right time for the right task. The session will cover new key technologies to help protect patient data and cover the recent announcement of Target Platform for Epic 2015.
Tags : 
     VMware AirWatch
By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
     Radius Intelligence
By: B Channels     Published Date: May 01, 2018
All technology companies are continuing their investment in IoT technologies: targeting technology verticals or market segments like Smart Homes or IIoT. They all need partners and alliances to expand in these verticalized markets. This post looks at who, where and the implications of IoT expansion.
Tags : 
     B Channels
By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : malware threats, cyberespionage, security technologies, security, it management, data management
     Kaspersky Lab
By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
     HP Inc.
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com