SlideShare a Scribd company logo
1 of 22
&
&
Find Marketing and IT’s
Common Ground
December 2015
Mark Rudolph, CRO, Ghostery
Ari Weil, VP Marketing, YOTTAA
& 2
Marketing and IT: On Two Different Paths
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Only 30% of marketers
and 13% of IT execs
describe their relationship
as ‘collaborative’
• 63% in each group say
they don’t share
incentives
* Source: 2015 CMO Digital Benchmark Survey
& 3
But a slow site has serious business consequences
• According to Aberdeen, every 1-second delay resulted in:
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
11%
Fewer
Page
Views
16%
Decrease
in CSAT
7% loss in
conversion
& 4Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Every 100ms of latency costs up to 1% of revenue. *1
• 46% of online shoppers cite checkout speed as the #1 factor in determining
whether they will return to a site. *2
• Estimated cost of mixed content warnings on the top 100 internet retailers is
$310M per annum. *3
• 80% of the digital vendors on a brand’s site are placed there indirectly. *4
*1 Amazon internal study 2013
*2 Radware internal study 2014
*3 Ponemon & Ghostery Mixed Content Warnings Study – April 2015
*4 Ghostery research
*5 Akamai survey 2009
1% 46% $310M 80% 47%
of revenue lost for every
100ms of latency1
of online shoppers that
cited checkout speed as
the #1 factor in
determining whether they
would return to a site2
estimated cost of mixed
content warnings on the
top 100 internet retailers
per annum3
of the digital vendors on a
brand’s site are placed
there indirectly4
of consumers expect a
page to load in 2 seconds
or less5
But Numbers Show They Should Work Closely Together
& 5
Not Managing This Has a Direct Business Impact
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
GLOBAL PRIVACY
COMPLIANCE ISSUES
Lower Revenue
Higher Operational Cost
Negative Brand Perception
PERFORMANCE GOVERNANCE SECURITY PRIVACY
POOR CUSTOMER
EXPERIENCE
WASTED OPERATIONS
TIME (MTTR)
INCREASED
ABANDONMENT RATES
& 6
About Ghostery
• Founded in 2009
• Over 40 Million consumers
rely on Ghostery’s Browser
Extension and Mobile App to
control how their data is
shared online
• Dominant provider of privacy
governance solutions
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 7
Ghostery Allows Safer, Faster, and More Trusted Digital Experiences
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
RETAIL TRAVEL FINANCIAL SERVICES CPG PUBLISHERS TECHNOLOGY
& 8
Ghostery MCM Exposes Long Redirect Chains
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 9
Case Study: A Place For Mom
• Founded 15 years ago to
help families find assisted
living facilities for their
loved ones
• Largest senior living
referral service in the U.S.
and Canada
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 10
Trackermap: BEFORE
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 11
Trackermap: AFTER
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 12
Reduction in Average Tag Count
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 13
50% Fewer Vendors + 10% Page Latency Improvement = Better ROI
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
&
YOTTAA Automates Acceleration & Security for Leading Brands
>500WEB APPS
OPTIMIZED
$1BREVENUE
INFLUENCED
& 15
Misalignment: Performance vs. Content Aggregation Points
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Browser CDN Firewall Web Servers
LEGACY
MODERN
DAY
ADCLB
CONTENT
AGGREGATION
EXPERIENCE
OPTIMIZATION
CYBER
SECURITY
CONTENT
ACCELERATION
CONTENT AGGREGATION
DMZ
Servers
DMZ
ADCBrowser
SOCIAL MEDIA
PERSONAL-
IZATION
A/B TESTING
PAYMENT
GATEWAY
RATINGS &
REVIEWS
LOCALIZATION
ADVERTISING USER FEEDBACK
BUSINESS
ANALYTICS
RECOMMEND
CONTENT
eCOMMERCE
PLATFORM
MARKETING
AUTOMATION
APP OPTIMIZATION
ContextIntelligenceTM Platform
INFRASTRUCTURE
IaaS BUILD
PaaS DEVELOP
SaaS EXTEND
AdaptiveCDN
Interchange
ContextAgent
InstantON &
AppSequencing ContextSAFE
& 16
Case Study: Moosejaw
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Internet Retailer Top 500
The Most Fun Retailer on the
Planet
& 17
Commerce Application Development Requires Many Scripts & Tags
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
272
requests
9.2
megabytes
& 18
Requirement: Maintain 100% of content, but accelerate by 40%
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Web
Infrastructure
Browser
ContextIntelligenceTM
Platform
ContextAgentTM
On-device Intelligence
INJECT
SEQUENCE
DELAY
& 19
4D Optimization: Automated Acceleration with Machine Learning
26 Requests Completed in 2 Seconds
To Start Rendering Page
135 Requests Completed in 6 Seconds
To Fully Display Page
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
MACHINE LEARNING
RULES ENGINE
& 20
Benefits of 4D: Faster Pages, Increased Conversions, Full Fidelity
36% Faster
Time to Display
4.6% Lower
Bounce Rate
17% Higher
Conversion Rate
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Dan Pingree
VP Marketing, Moosejaw
Performance was the main reason we selected Yottaa. A growing
amount of our traffic comes from mobile so it is imperative that
page loading speeds on mobile and tablet devices are as fast as
possible. Yottaa helped us to significantly speed up performance
on these devices resulting in a much better experience for our
customers.
&
&
AT&T
June 2015
Q & A&
& 22Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Mark Rudolph
Chief Revenue Officer
mark@ghostery.com
@RudyGhostery
Ari Weil
VP of Marketing &
Business Development,
aweil@yottaa.com
@aweil
THANK YOU

More Related Content

What's hot

Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?Colin McGovern
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Cohesive Networks
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...ForgeRock
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity ForgeRock
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machinePriyanka Aash
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessBomgar
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITMatteo Masi
 
Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
 
Fighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceAjeet Singh
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 

What's hot (20)

Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged Access
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed IT
 
Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Fighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and Intelligence
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 

Similar to Marketing and IT Common Ground

2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT DepartmentsYottaa
 
Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery, Inc.
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23AirTight Networks
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues Allot Communications
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retailCloudera, Inc.
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...apidays
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTSAirTight Networks
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...SaaStock
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...Mintigo1
 
lendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLinklendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLinkKristina Quinn
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCloudIDSummit
 
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summits
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
 
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New WorldForgeRock
 

Similar to Marketing and IT Common Ground (20)

2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments
 
Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retail
 
ISG Market Update
ISG Market UpdateISG Market Update
ISG Market Update
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...
Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...
Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
 
lendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLinklendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLink
 
The Truth About Mobile Marketing for B2B Companies
The Truth About Mobile Marketing for B2B CompaniesThe Truth About Mobile Marketing for B2B Companies
The Truth About Mobile Marketing for B2B Companies
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
 
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
 

More from Ghostery, Inc.

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorGhostery, Inc.
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery, Inc.
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery, Inc.
 

More from Ghostery, Inc. (6)

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer Behavior
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing Cloud
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White Paper
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Marketing and IT Common Ground

  • 1. & & Find Marketing and IT’s Common Ground December 2015 Mark Rudolph, CRO, Ghostery Ari Weil, VP Marketing, YOTTAA
  • 2. & 2 Marketing and IT: On Two Different Paths Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Only 30% of marketers and 13% of IT execs describe their relationship as ‘collaborative’ • 63% in each group say they don’t share incentives * Source: 2015 CMO Digital Benchmark Survey
  • 3. & 3 But a slow site has serious business consequences • According to Aberdeen, every 1-second delay resulted in: Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 11% Fewer Page Views 16% Decrease in CSAT 7% loss in conversion
  • 4. & 4Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Every 100ms of latency costs up to 1% of revenue. *1 • 46% of online shoppers cite checkout speed as the #1 factor in determining whether they will return to a site. *2 • Estimated cost of mixed content warnings on the top 100 internet retailers is $310M per annum. *3 • 80% of the digital vendors on a brand’s site are placed there indirectly. *4 *1 Amazon internal study 2013 *2 Radware internal study 2014 *3 Ponemon & Ghostery Mixed Content Warnings Study – April 2015 *4 Ghostery research *5 Akamai survey 2009 1% 46% $310M 80% 47% of revenue lost for every 100ms of latency1 of online shoppers that cited checkout speed as the #1 factor in determining whether they would return to a site2 estimated cost of mixed content warnings on the top 100 internet retailers per annum3 of the digital vendors on a brand’s site are placed there indirectly4 of consumers expect a page to load in 2 seconds or less5 But Numbers Show They Should Work Closely Together
  • 5. & 5 Not Managing This Has a Direct Business Impact Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved GLOBAL PRIVACY COMPLIANCE ISSUES Lower Revenue Higher Operational Cost Negative Brand Perception PERFORMANCE GOVERNANCE SECURITY PRIVACY POOR CUSTOMER EXPERIENCE WASTED OPERATIONS TIME (MTTR) INCREASED ABANDONMENT RATES
  • 6. & 6 About Ghostery • Founded in 2009 • Over 40 Million consumers rely on Ghostery’s Browser Extension and Mobile App to control how their data is shared online • Dominant provider of privacy governance solutions Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 7. & 7 Ghostery Allows Safer, Faster, and More Trusted Digital Experiences Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved RETAIL TRAVEL FINANCIAL SERVICES CPG PUBLISHERS TECHNOLOGY
  • 8. & 8 Ghostery MCM Exposes Long Redirect Chains Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 9. & 9 Case Study: A Place For Mom • Founded 15 years ago to help families find assisted living facilities for their loved ones • Largest senior living referral service in the U.S. and Canada Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 10. & 10 Trackermap: BEFORE Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 11. & 11 Trackermap: AFTER Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 12. & 12 Reduction in Average Tag Count Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 13. & 13 50% Fewer Vendors + 10% Page Latency Improvement = Better ROI Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 14. & YOTTAA Automates Acceleration & Security for Leading Brands >500WEB APPS OPTIMIZED $1BREVENUE INFLUENCED
  • 15. & 15 Misalignment: Performance vs. Content Aggregation Points Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Browser CDN Firewall Web Servers LEGACY MODERN DAY ADCLB CONTENT AGGREGATION EXPERIENCE OPTIMIZATION CYBER SECURITY CONTENT ACCELERATION CONTENT AGGREGATION DMZ Servers DMZ ADCBrowser SOCIAL MEDIA PERSONAL- IZATION A/B TESTING PAYMENT GATEWAY RATINGS & REVIEWS LOCALIZATION ADVERTISING USER FEEDBACK BUSINESS ANALYTICS RECOMMEND CONTENT eCOMMERCE PLATFORM MARKETING AUTOMATION APP OPTIMIZATION ContextIntelligenceTM Platform INFRASTRUCTURE IaaS BUILD PaaS DEVELOP SaaS EXTEND AdaptiveCDN Interchange ContextAgent InstantON & AppSequencing ContextSAFE
  • 16. & 16 Case Study: Moosejaw Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Internet Retailer Top 500 The Most Fun Retailer on the Planet
  • 17. & 17 Commerce Application Development Requires Many Scripts & Tags Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 272 requests 9.2 megabytes
  • 18. & 18 Requirement: Maintain 100% of content, but accelerate by 40% Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Web Infrastructure Browser ContextIntelligenceTM Platform ContextAgentTM On-device Intelligence INJECT SEQUENCE DELAY
  • 19. & 19 4D Optimization: Automated Acceleration with Machine Learning 26 Requests Completed in 2 Seconds To Start Rendering Page 135 Requests Completed in 6 Seconds To Fully Display Page Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved MACHINE LEARNING RULES ENGINE
  • 20. & 20 Benefits of 4D: Faster Pages, Increased Conversions, Full Fidelity 36% Faster Time to Display 4.6% Lower Bounce Rate 17% Higher Conversion Rate Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Dan Pingree VP Marketing, Moosejaw Performance was the main reason we selected Yottaa. A growing amount of our traffic comes from mobile so it is imperative that page loading speeds on mobile and tablet devices are as fast as possible. Yottaa helped us to significantly speed up performance on these devices resulting in a much better experience for our customers.
  • 22. & 22Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Mark Rudolph Chief Revenue Officer mark@ghostery.com @RudyGhostery Ari Weil VP of Marketing & Business Development, aweil@yottaa.com @aweil THANK YOU

Editor's Notes

  1. Our Trackermap exposes tags making extended calls on your website. These long redirect
  2. Yottaa has been accelerating and security web and mobile apps since 2009. Our solution is deployed at 150 Enterprises across the globe and performs real-time optimizations for > 500 apps, influencing over $1bn in revenue for our customers. Those customers include 13 of the Internet Retailer top 500, 26 of the Internet Retailer top 1000, and 75 businesses with an Alexa rank under 5000. Yottaa is proven to be the fastest and most complete app acceleration solution in the industry, speeding up rendering and visitor flows by 40% or more. SEGUE: So what makes Yottaa unique?
  3. e.g. all.js widgets.js ig-follow.js tag.js magpie.js www.googlecommerce.com/trustedstores
  4. Widget.JS is a framework that provides routing, events and stateful widgets to JS Apps.