TechBytes with Chris Warnock, Content Analyst at GetApp (now part of Gartner)

Could you tell us about your role and the industry/technology you cover at GetApp? I’m an Analyst at GetApp where I cover trends in Sales, Marketing and Customer Experience—including Marketing Psychology and Consumer data privacy. How have consumer attitudes towards personal data shifted in the last few years? Consumer concerns around privacy and personal data are on the rise. A recent GetApp survey found 91% of U.S. consumers feel ads know too much personal information about them. Additionally, many people seek to…

Top 5 Technology Trends to Impact the Digital Infrastructure Landscape in 2020

Equinix Predicts Hybrid Multicloud, Artificial Intelligence, Cybersecurity, Data Regulation and Sustainability Will Be Key Factors Influencing How Organizations Undergo Digital Transformation Equinix, Inc., the global interconnection and data center company, released its top five technology trend predictions for 2020, which point toward the critical digital transformation that organizations are making to lead in the new digital era. Equinix's expansive footprint across more than 50 global markets, and its position as a…

OpenText and Reveille Software Partner to Improve Content Security

New Offering Closes Security Blind Spots and Provides Early Issue Detection OpenText, a global leader in Enterprise Information Management (EIM), announced the launch of OpenText™ Content Security for EnCase by Reveille. Developed with Solution Extension (SolEx) provider Reveille Software, a provider of active insight solutions for ECM and EIM content, Opentext Content Security for EnCase by Reveille provides early detection and awareness of content corruption. This new solution continuously monitors for suspicious…

CrowdStrike Announces Winners of Customer Excellence Awards at User Conference Fal.Con UNITE 2019

CrowdStrike® Inc., a leader in cloud-delivered endpoint protection, today announced the winners of its Customer Excellence Awards at its third annual user conference, Fal.Con UNITE. The awards program recognizes organizations and business leaders who have demonstrated a lasting commitment to elevate the role and impact of cybersecurity, and have implemented cutting-edge security technologies and proactive security strategies. Fal.Con UNITE featured compelling keynotes and sessions from some of the world’s top minds in…

TechBytes with James Litton, CEO and Co-Founder at Identity Automation

Could you tell us about your journey? What led you to start Identity Automation? I’ve worked in IT throughout my professional career. I previously worked for big companies like Coca-Cola, Veritas Software, Symantec, and Cray. My Co-founder Troy Moreland proposed the idea of starting our own identity and access management (IAM) consulting company in the early 2000s, which was the genesis of Identity Automation. When we initially started the company in 2004, we helped customers implement other IAM providers’ solutions,…

Webroot Finds Windows 7 is Becoming Even Riskier, Infections up by 71%

Also, Phishing Attempts Seen by Webroot Increased by 400% Webroot, a Carbonite company, shared the results of its Webroot Threat Report: Mid-Year Update, which explores the evolving cybersecurity landscape. Based on trends observed in the first half of 2019, Webroot found that 1 in 50 URLs are malicious, nearly one-third of phishing sites use HTTPS and Windows 7 exploits have grown 75% since January. This report also highlights the importance of user education, as phishing lures have become more personalized as hackers use…

Introducing Okta DynamicScale: Industry-Leading Customer Identity Solution Supports 500,000 Authentications per Minute

Advanced Infrastructure Automation and Intelligence Capabilities Offer Seamless Identity Performance at Incredible Scale for the World’s Largest Sites and Apps Okta, Inc., the leading independent provider of identity for the enterprise, at Okta Showcase announced DynamicScale, a new high capacity customer identity offering that enables transformative scale for the largest businesses and the most highly-trafficked apps and sites on the internet, supporting traffic bursts and extended use of up to 500,000 authentications…

The Relevancy Group releases The Relevancy Ring 2019 CDP Buyer’s Guide

Findings Indicate Close to 50% of Companies Currently Using a CDP and Seeing Significant Improvements in Business as a Result The Relevancy Group, a leading market research and advisory firm, released "The Relevancy Ring 2019 Customer Data Platform (CDP) Buyer's Guide." Leveraging their proprietary combination of customer (user) feedback with a multi-analyst assessment approach.  The 2019 CDP guide provides a quantifiable measurement of eight leading enterprise-class Customer Data Platform Providers (CDPs) including…

Bpm’online has Successfully Renewed ISO 27001 Certification for Information Security Management

Bpm'online, a global business software company leading in the space of low-code, process automation and CRM, announces its successful renewal of certification for ISO 27001. This once again confirmed the high level of data protection from various threats, including breaches. The audit was performed by Bureau Veritas Certification (BVC), a world leader in consumer product testing, inspection and auditing services. Marketing Technology News: Comlinkdata and Tutela Join Forces to Optimize Subscriber Experiences and Customer…

4 Reasons Malvertisers Are Some of the Most Sophisticated Advertisers in the World

It’s tempting to write off malvertisers as simply an annoyance or unsophisticated criminals, but nothing could be further from the truth. Far from being crude spammers, malvertisers are sophisticated, smart, persuasive, and often more technologically savvy than many of their legitimate advertising counterparts. And they’re extremely dangerous and costly. The last IAB estimate put the cost of malvertising at just over $1 billion. In case that figure isn’t troubling enough, here are a few more reasons why you need to take…

MarTech Interview with Robert Humphrey, CMO at SecureAuth

"Putting identity at the center of a consumer or employee journey is critical from both a business and security perspective." Tell us about your role and journey into technology. What inspired you to start at SecureAuth? I began my career in Technology Sales, many years ago, selling mainframe computers to large enterprises. Throughout the course of my career, participating on the Sales and Marketing side of the business, I’ve witnessed most of the major technology shifts. With each major shift, there have been key…

Building and Maintaining Digital Trust and Brand Loyalty: A Three-Step Process

Businesses that successfully achieve digital transformation don’t just complete it overnight. Transformation has many key components and best practices, and it’s a continuous process. When it is achieved though, these digital enterprises have the opportunity to prosper, build customer trust and maintain brand loyalty. As we engage with customers through more digital channels, maintaining their trust, in particular, becomes a highly paramount component to keeping your business afloat and prosperous. In recent years, customer…

Inefficiency in Contract Management Leaves Money on the Table, Finds DocuSign Report

Survey of >800 Companies Shows Manual Processes Block Contract Management Success--As Do Approval, Clause Management and Workflow Issues To offer companies insight into the latest trends and best practices for handling contracts in the modern workplace—and to help them optimize their processes as a result—DocuSign released the fifth annual "State of Contract Management" report. The report—previously published by SpringCM (the company acquired by DocuSign in September 2018)—analyzes the benefits and pain points of…

The Key to Meeting Revenue Goals? It’s in Your Contracts

The complexity of today’s global market means there are more risks inherent in running a business. Between a shifting regulatory landscape and cyber breaches, many companies are focused on risks external to the company. There is, however, a significant hidden risk, and opportunity for revenue gain, that lies internally within a company’s contracts. Why Contract Management is important Vallen is an industry-leading provider of indirect industrial supplies. Like most companies, we are very focused on customer satisfaction…

Gift Cards Surpass Wire Transfers as Top Fraudster Cash-Out Method

Agari releases findings of new quarterly email security trends report Agari, the next-generation Secure Email Cloud that restores trust to the inbox, released the findings of its Q3 Email Fraud and Identity Deception Trends report that delves into changing techniques used in email fraud and scams, during the April to June 2019 period. The top finding shows that fraudsters continue to shift away from their traditional methods. Gift cards have become the preferred mode that…

TechBytes with Stephen Cox, VP and Chief Security Architect at SecureAuth

Tell us about your role and the team/technology you handle at SecureAuth. I serve in a multifaceted role across Engineering, Marketing, Public Relations, and Sales. I have architected and developed solutions for SecureAuth’s Product Engineering department. I serve as a Subject Matter Expert and Content Developer for Marketing as well as being a spokesperson for the company. I often help the Sales department in terms of solutions architecture and high-level discussions with prospects. How did you arrive at SecureAuth? I…

Roundtable Series: The Benefits of AI for Retail Operations

AI is becoming a key driver for Retail Operations. According to Gartner's survey, AI for Retail Operations would significantly transform product development and selection, planning, buying, and demand forecasting. Today, retailers are focusing on automation and customer-centricity using AI. What's working with retailers using AI? The retailers have a huge advantage of having access to a vast amount of customer data and in-depth analytics driving shopper's behavior across various retail channels, including physical stores…

TechBytes with Mark Summerson (Nexmo) and Ryan Gosling (Callsign)

Tell us about your role and the team/technology you handle at Vonage.  Mark Summerson (MS): Vonage works with many of the most innovative brands around the world to help them build new, personal and compelling customer interactions. With Nexmo, the Vonage API platform, we enable them to integrate consumer communications such as SMS, voice, video and social messaging, such as WhatsApp, into the very apps and services that customers prefer. Increasingly, more traditional enterprises are realizing that investing in Customer…

Cheetah Digital Announces Acquisition of Wayin

Marketers are able to collect zero- and first-party customer data to drive personalized, real-time experiences across all channels, with speed, scale, and cost efficiencies Cheetah Digital, the world’s leading independent, enterprise cross-channel marketing software company, announced today it has acquired Wayin, a global leader in zero-party data collection and activation. The acquisition strengthens Cheetah Digital’s ability to help marketers collect zero- and first-party data and preference insights to drive…

Akamai Introduces the Edge Cloud Solution, Designed to Scale, Secure and Simplify IoT Connected Device and In-Application Messaging

IoT Edge Connect, the newest product in the Edge Cloud solution line, enables real-time messaging and reliability to millions of IoT and application endpoints Akamai, the intelligent edge platform for securing and delivering digital experiences, unveiled Edge Cloud, a solution line that leverages the power of the Akamai edge platform to streamline and secure the delivery of data to connected devices and in-application messaging at scale. Edge Cloud is designed to serve the needs of businesses bringing billions of endpoints…