Pandemic has taken a fair share of the toll on every economy, affecting millions of businesses across the globe. As organizations are adopting technology and innovation to fulfil their quest for growth, they must comprehend, the ghost of cyberattack will come to haunt them sooner or later. Cyber breaches will not only cause brand degradation, but also lead to loss of digital assets, and change in consumer behaviour. As a result, companies are considering corporate cyber insurance as a part of their cybersecurity strategies. Click on the link to read what cyber insurance is and why companies direly need it.
Insights Success Magazine, we have The 10 Most Trusted Cyber Threat Solution Providers, in order to assist businesses to choose their right Cyber Threat Solution Providers. In this issue, we have specially featured Tesseract Global as the cover story. Tesseract Global is a renowned cyber security solution provider, delivering defensive & offensive security capabilities to diverse businesses.
Preparing your enterprise against cyber-attacks is no longer a luxury but a necessity. And only those who have leveraged technology without any fear of being destroyed with a single cyber-attack can only be considered to have a digital advantage. This will not only enhance their performance but also put them one step ahead of the competition. Learn how cybersecurity is linked with digital maturity with the following link.
Pandemic has taken a fair share of the toll on every economy, affecting millions of businesses across the globe. As organizations are adopting technology and innovation to fulfil their quest for growth, they must comprehend, the ghost of cyberattack will come to haunt them sooner or later. Cyber breaches will not only cause brand degradation, but also lead to loss of digital assets, and change in consumer behaviour. As a result, companies are considering corporate cyber insurance as a part of their cybersecurity strategies. Click on the link to read what cyber insurance is and why companies direly need it.
Insights Success Magazine, we have The 10 Most Trusted Cyber Threat Solution Providers, in order to assist businesses to choose their right Cyber Threat Solution Providers. In this issue, we have specially featured Tesseract Global as the cover story. Tesseract Global is a renowned cyber security solution provider, delivering defensive & offensive security capabilities to diverse businesses.
Preparing your enterprise against cyber-attacks is no longer a luxury but a necessity. And only those who have leveraged technology without any fear of being destroyed with a single cyber-attack can only be considered to have a digital advantage. This will not only enhance their performance but also put them one step ahead of the competition. Learn how cybersecurity is linked with digital maturity with the following link.
Protect your confidential information while improving servicesCloudMask inc.
Over the last few decades, the financial sector has outgrown banks, as financial engineering, digital money and regulatory changes have evolved. Assets managed by financial firms (equity and various types of debt) are larger, as corporate debt has surpassed federal, state and local government’s debt. The US banks’ share of assets under management (AUM) accordingly declined from 58% in 1907 to 27% in 2008, while pension, mutual funds and non-depository firms (e.g., private equity and hedge funds) have grown substantially.
The 10 most innovative compliance assessment service provider 2021(1) compressedinsightssuccess2
The 10 Most Innovative Compliance Assessment Service Provider 2021, features companies that help organizations reduce vulnerabilities, increase security function efficiently
Cyberattacks on government agencies at all levels can compromise private citizen information and leave the United States vulnerable to national security threats. Take these first steps toward stronger cybersecurity hygiene.
Insider's Guide to Cybersecurity for Government eBook: http://aka.ms/govcybersecurityguide
To implement data-centric security, while simultaneously empowering your business to compete and win in today’s nano-second world, you need to understand your data flows and your business needs from your data. Begin by answering some important questions:
•
What does your organization need from your data in order to extract the maximum business value and gain a competitive advantage?
•
What opportunities might be leveraged by improving the security posture of the data?
•
What risks exist based upon your current security posture? What would the impact of a data breach be on the organization? Be specific!
•
Have you clearly defined which data (both structured and unstructured) residing across your extended enterprise is most important to your business? Where is it?
•
What people, processes and technology are currently employed to protect your business sensitive information?
•
Who in your organization requires access to data and for what specific purposes?
•
What time constraints exist upon the organization that might affect the technical infrastructure?
•
What must you do to comply with the myriad government and industry regulations relevant to your business?
Finally, ask yourself what a successful data-centric protection program should look like in your organization. What’s most appropriate for your organization?
The answers to these and other related questions would provide you with a clearer picture of your enterprise’s “data attack surface,” which in turn will provide you with a well-documented risk profile. By answering these questions and thinking holistically about where your data is, how it’s being used and by whom, you’ll be well positioned to design and implement a robust, business-enabling data-centric protection plan that is tailored to the unique requirements of your organization.
As if IT security didn’t have enough issues to contend with, it now has another. And,it’s a troublesome one...mitigating the risk of repelling customers because security defenses make your company unattractive or too hard to do business with. In this age of the customer – who wants everything available on every device from everywhere all the time – IT security is at risk of hurting the very business it is charged with protecting.
A recommendation for software development responses for futureMax Justice
This presentation was created for organizations looking for a way to reduce their risks by establishing and performing secure software development by implementing innovative solutions when responding to future vulnerabilities and threats
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Cloud computing, a highly flexible deployment model is emerging because of enhancing interdependence of business and IT. Effective and efficient resource sharing, interconnecting between people, department and companies is possible because of this emerging technology. Cloud computing also provides a stable environment where Telcos can improve business outcomes by leveraging their experience in offering IT centric managed services. Though not without its flaws, cloud computing looks to change the way companies do business in the near future.
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
The new RSA Security Brief highlights that basic security lapses still contribute to most security incidents. The report identifies top areas for improvement and provides practical guidance on measures that deliver the greatest impact on organizations' ability to respond to cyber attacks and data breaches.
About RSA Security Brief :
RSA Security Briefs provide security leaders and risk management executives with essential guidance on today's most pressing information security threats and opportunities. Each Brief is created by a select team of experts who connect experiences across organizations to share specialized knowledge on a critical security topic. Offering both big-picture insight and practical technology guidance, RSA Security Briefs are vital reading for today's forward-thinking security and risk management practitioners.
Read More via
Insights Success has shortlisted, “The 10 Most Trusted Networking Solution Providers, 2018” that are ensuring optimal network efficiency and security. Our shortlisted companies include, Turn-key Technologies, is a leader in networking, communications and security, a wireless semiconductor and system solutions company focusing on innovative, ultra-low power and high-performance products for next-generation wireless applications
This report addresses the common challenge of BMS cyber security and its underlying components. Vulnerable elements across a range of components were investigated, with the vulnerabilities potentially affecting more than 10 million people.
During the research, some of the risks discovered within these BMS components include the potential ability for threat actors to:
Remotely lock or unlock doors and gates;
Control physical access of restricted areas;
Deny service (shutdown controllers);
Manipulate alarms and video surveillance;
Control temperature, boilers, air-condition, windows blinds, gas readings, etc.
Through a detailed analysis of the affected components, we provide clear cyber security recommendations for end users, vendors and system integrators, as well as a thorough technical breakdown including Proof of Concept exploit code, which allow unauthenticated remote code execution against the affected BMS products.
https://applied-risk.com/resources/i-own-your-building-management-system
GIAC understands that the modern enterprise faces a growing cybersecurity threat. We are dedicated to producing InfoSec professionals that have the proven skills and knowledge to contribute to the cybersecurity defense of the largest and most important enterprises on the globe.
It staff augmentation before and after covid 19Katy Slemon
Have a look at this infographic blog post to understand how IT staff augmentation services have transformed lifestyle and work patterns before and after COVID- 19.
Hence, Insights Success has shortlisted, “The 10 Best Performing Managed Security Service Providers 2018” who are aggressively establishing industrial perception towards organizations process management system.
Protect your confidential information while improving servicesCloudMask inc.
Over the last few decades, the financial sector has outgrown banks, as financial engineering, digital money and regulatory changes have evolved. Assets managed by financial firms (equity and various types of debt) are larger, as corporate debt has surpassed federal, state and local government’s debt. The US banks’ share of assets under management (AUM) accordingly declined from 58% in 1907 to 27% in 2008, while pension, mutual funds and non-depository firms (e.g., private equity and hedge funds) have grown substantially.
The 10 most innovative compliance assessment service provider 2021(1) compressedinsightssuccess2
The 10 Most Innovative Compliance Assessment Service Provider 2021, features companies that help organizations reduce vulnerabilities, increase security function efficiently
Cyberattacks on government agencies at all levels can compromise private citizen information and leave the United States vulnerable to national security threats. Take these first steps toward stronger cybersecurity hygiene.
Insider's Guide to Cybersecurity for Government eBook: http://aka.ms/govcybersecurityguide
To implement data-centric security, while simultaneously empowering your business to compete and win in today’s nano-second world, you need to understand your data flows and your business needs from your data. Begin by answering some important questions:
•
What does your organization need from your data in order to extract the maximum business value and gain a competitive advantage?
•
What opportunities might be leveraged by improving the security posture of the data?
•
What risks exist based upon your current security posture? What would the impact of a data breach be on the organization? Be specific!
•
Have you clearly defined which data (both structured and unstructured) residing across your extended enterprise is most important to your business? Where is it?
•
What people, processes and technology are currently employed to protect your business sensitive information?
•
Who in your organization requires access to data and for what specific purposes?
•
What time constraints exist upon the organization that might affect the technical infrastructure?
•
What must you do to comply with the myriad government and industry regulations relevant to your business?
Finally, ask yourself what a successful data-centric protection program should look like in your organization. What’s most appropriate for your organization?
The answers to these and other related questions would provide you with a clearer picture of your enterprise’s “data attack surface,” which in turn will provide you with a well-documented risk profile. By answering these questions and thinking holistically about where your data is, how it’s being used and by whom, you’ll be well positioned to design and implement a robust, business-enabling data-centric protection plan that is tailored to the unique requirements of your organization.
As if IT security didn’t have enough issues to contend with, it now has another. And,it’s a troublesome one...mitigating the risk of repelling customers because security defenses make your company unattractive or too hard to do business with. In this age of the customer – who wants everything available on every device from everywhere all the time – IT security is at risk of hurting the very business it is charged with protecting.
A recommendation for software development responses for futureMax Justice
This presentation was created for organizations looking for a way to reduce their risks by establishing and performing secure software development by implementing innovative solutions when responding to future vulnerabilities and threats
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Cloud computing, a highly flexible deployment model is emerging because of enhancing interdependence of business and IT. Effective and efficient resource sharing, interconnecting between people, department and companies is possible because of this emerging technology. Cloud computing also provides a stable environment where Telcos can improve business outcomes by leveraging their experience in offering IT centric managed services. Though not without its flaws, cloud computing looks to change the way companies do business in the near future.
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
The new RSA Security Brief highlights that basic security lapses still contribute to most security incidents. The report identifies top areas for improvement and provides practical guidance on measures that deliver the greatest impact on organizations' ability to respond to cyber attacks and data breaches.
About RSA Security Brief :
RSA Security Briefs provide security leaders and risk management executives with essential guidance on today's most pressing information security threats and opportunities. Each Brief is created by a select team of experts who connect experiences across organizations to share specialized knowledge on a critical security topic. Offering both big-picture insight and practical technology guidance, RSA Security Briefs are vital reading for today's forward-thinking security and risk management practitioners.
Read More via
Insights Success has shortlisted, “The 10 Most Trusted Networking Solution Providers, 2018” that are ensuring optimal network efficiency and security. Our shortlisted companies include, Turn-key Technologies, is a leader in networking, communications and security, a wireless semiconductor and system solutions company focusing on innovative, ultra-low power and high-performance products for next-generation wireless applications
This report addresses the common challenge of BMS cyber security and its underlying components. Vulnerable elements across a range of components were investigated, with the vulnerabilities potentially affecting more than 10 million people.
During the research, some of the risks discovered within these BMS components include the potential ability for threat actors to:
Remotely lock or unlock doors and gates;
Control physical access of restricted areas;
Deny service (shutdown controllers);
Manipulate alarms and video surveillance;
Control temperature, boilers, air-condition, windows blinds, gas readings, etc.
Through a detailed analysis of the affected components, we provide clear cyber security recommendations for end users, vendors and system integrators, as well as a thorough technical breakdown including Proof of Concept exploit code, which allow unauthenticated remote code execution against the affected BMS products.
https://applied-risk.com/resources/i-own-your-building-management-system
GIAC understands that the modern enterprise faces a growing cybersecurity threat. We are dedicated to producing InfoSec professionals that have the proven skills and knowledge to contribute to the cybersecurity defense of the largest and most important enterprises on the globe.
It staff augmentation before and after covid 19Katy Slemon
Have a look at this infographic blog post to understand how IT staff augmentation services have transformed lifestyle and work patterns before and after COVID- 19.
Hence, Insights Success has shortlisted, “The 10 Best Performing Managed Security Service Providers 2018” who are aggressively establishing industrial perception towards organizations process management system.
Monitoring Analytics To Create Customer Value And ExperienceeTailing India
According to research conducted by Gartner,Customer Experience (CX) is the top priority for companies who have invested in analytics software. The goal for any company is to have an ‘always on’ view of how their operational performance that impacts on the way that customersexperience their brand across all touch-points. This is now possible by using untapped machine data in combination with more traditional measures of customer satisfaction such as Net Promoter Score (NPS).
Through precise location analytics, retailers now can monitor the entire path to purchase. With this data, marketers better understand what led to the purchase providing the ability to move beyond the traditional blanketed “campaign” to a year-round interaction based on consumer behavior. Customers “opt-in” by mobile app to receive highly-targeted promotions, information about merchandise they may have “visited” but didn’t purchase, and discounts for major events – based on correlations like visits, dwell and intent – to drive sales like never before.
Similar to 7 Experts on Transforming Customer Experience with Data Insights (1) (20)
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
7 Experts on Transforming Customer Experience with Data Insights (1)
1. Sponsored by
How to use data to gain knowledge, drive engagement,
and acquire new customers
Experts on
Transforming
Customer Experience
with Data Insights
3. 3
The experts featured in this guide market a seriously diverse mix of products—pet supplies, newspapers
and magazines, vitamins, cosmetics, food, data analytics services, mattresses. But they share
at least one essential-to-success philosophy: it’s always and entirely about the customer. You grow your
business by developing products that customers want to buy, engaging them with content they care about,
encouraging them with incentives they value, and continually delivering experiences that delight them.
To this end, these executives have developed successful strategies to use their data for maximum positive
impact.
But their success has not come without challenges. How do you integrate legacy data and protect sensitive
information? How do you personalize at scale? How do you identify “moments that matter” in the customer
journey? See how each business uses a customer data platform to overcome these challenges. I trust you’ll
find their experiences informative.
We’ve built our own company around helping organizations use data to deliver the best-possible customer
experience. Our customer-journey orchestration features, for example, enable macro journey planning to
give businesses more power to influence pivotal touchpoints and move customers forward to make more
purchases and develop loyalty. Like the marketing executives you’ll meet in these essays, we strive to develop
products that deliver value to our customers. When they thrive, we thrive.
Hiro Yoshikawa
Founder and CEO of Treasure Data
VP and General Manager, Data Business, Arm Treasure Data
Arm Treasure Data Customer Data
Platform (CDP) empowers companies
by delivering rich customer insights
that drive outstanding customer
experiences. Built on a strong data
management foundation, our CDP
enables brands to securely unify
customer data across silos at scale
so they can better identify, engage
and acquire customers. The highly
configurable platform evolves with your
existing technology stack to future-
proof all customer data initiatives.
Arm Treasure Data is fully owned
by Arm and has more than 400
customers including Fortune 500
and Global 2000 enterprises.
Phone: +1.866.899.5386
www.treasuredata.com
FOREWORD
4. MEET OUR EXPERTS
SHERIF MITYAS
Chief Experience Officer,
TGI Fridays,
pg. 6
MELANIE HUET
EVP, Chief Marketing Officer,
Serta Simmons Bedding,
LLC,
pg. 18
PATRICIA ARAGÓN LEÓN
CDO LATAM for Luxe Division,
L’Oréal,
pg. 9
NADINA GUGLIELMETTI
Vice President, General
Manager, Marketing,
The Vitamin Shoppe,
pg. 15
PANKAJ TIBREWAL
VP of Product,
Arm Treasure Data,
pg. 12
KIRAN KUMAR
Digital Product Management,
Operations and Marketing
in Retail,
Leading US Retailers (Various),
pg. 24
MARK CHILES
Chief Digital Officer &
Senior Vice President of Digital,
Hart Energy,
pg. 21
5. How Will You Reach Them Now?
Everything you thought you understood about your customers is changing.
You need up-to-the-minute data NOW to know what your customers need
and how they want to engage.
www.treasuredata.com
Let Arm Treasure Data’s award-winning Customer Data Platform (CDP) help you:
Efficiently find and
acquire customers
Engage customers
with relevant offers
Resolve data complexity
at enterprise scale
Trusted by:
6. 6
“We work with a third-party partner to help us pull in
different data types and connect the dots. They can tell
us, for example, these four data points are 98% likely
to be customer X.”
Using Customer Data to Find Those Moments That Matter
For Sherif Mityas, chief experience officer at TGI Fridays, making sense of
tremendous amounts of customer data requires understanding the customer
journey. “The key is to really understand customer journeys,” he explains. “Are they
in their car or at home? Are they scrolling through OpenTable or UberEats? What are
they doing, where are they, and what time are they doing that?”
By viewing all customer data through the customer journey lens, Mityas can identify
“moments that matter.” These are key decision points that can influence someone
to take an action like making a reservation, ordering food to-go, or driving to the
restaurant. Those are opportunities for communicating real-time incentives, such
as an offer to prepare a to-go order based on previous buying patterns, made just in
time to trigger a decision.
But if understanding the customer journey is key to analyzing customer data,
where does that customer journey knowledge come from? As it turns out, that
knowledge also comes from customer data.
The challenge becomes using customer data to build an understanding of the
journey, which is then used to further interpret new data.
To do that, Mityas collects data from all customer touchpoints and determines
which data is the most valuable for defining those “moments that matter.”
Sherif Mityas, the chief experience officer for
TGI Fridays, is responsible for the brand’s global
strategy and digital and technology efforts.
Before joining the restaurant chain, Mityas was
the managing partner at JS Consulting and the
CEO of Hollywood Video/Movie Gallery. Mityas
received a BS degree in aerospace engineering
from Boston University, an MS in mechanical
engineering from Rensselaer Polytechnic
Institute, and an MBA from Northwestern’s
Kellogg School of Management.
Sherif Mityas,
Chief Experience Officer,
TGI Fridays
7. 7
“We gather information from customers
who eat in our restaurants and through
WiFi in the restaurants, as well as those
who connect through our phone app or
website to get food to-go,” Mityas notes.
“We capture customer information from folks who engage with us on social media platforms like Twitter and Facebook. We know who
talks to us through voice-assisted devices like Alexa and Google Home. We know who calls our guest reservations line, as well as those
who are part of our 8 million member loyalty program, which is a major source of customer data.”
All this data goes into a data lake where Mityas uses artificial intelligence and machine learning to define those moments that matter
for customers at an individual, personalized level. “Because of the huge volume of data, we have AI tools that help us do that type of
personalization at scale.”
Doing this kind of analysis on so much data from disparate sources requires expertise Mityas does not have in-house. “We’re not a
technology company,” he says. “We sell beer and ribs. So we work with a third-party partner to help us pull in different data types and
connect the dots. They can tell us, for example, these four data points are 98% likely to be customer X.”
Having these capabilities lays the foundation for being able to process even more data inputs in the future and gain more opportunity to
affect experience as it is happening. Mityas explains, “There’s going to be a proliferation of voice data in the future.
People are talking to their cars and their refrigerators. We see that continuing to proliferate, even in our restaurants. It’s still a little bit out
there. But it’s the next frontier that will help us have less of a lag between capturing the data and using it to create a better experience for
customers.”
The real value in all this is what it does for the business. It can be significant, as Mityas notes: “If an average guest comes to the
restaurant four times a year, just improving that to five times a year gives you a 20% lift. That’s a massive growth trajectory. It would
pay for any investment that we’ve made 10 times over.” But to realize that, he emphasizes the solution needs to be relevant to the
customer journey. “It must always come back to the customer,” he says. “New data technologies are cool and shiny. But at the end of
the day, if it doesn’t impact the guest in a positive way and drive a return on investment, it doesn’t matter.”
“If an average guest comes to the restaurant four times a year,
just improving that to five times a year gives you a 20% lift.
That’s a massive growth trajectory.”
8. 8
KEY POINTS
The challenge is collecting different types of data from many
sources into one data resource and then being able to analyze
that at scale to identify key decision points at an individual
customer level.
What ultimately matters is that the data you collect and the actions
you take affect your customers in a positive way that drives
business and a return on investment.
1
2
Sherif Mityas,
Chief Experience Officer,
TGI Fridays
9. 9
“The biggest challenge is ‘info-besity’—incalculable
amounts of data, but not enough bandwidth or time
to digest it.”
Customer Data Without a Purpose Is Meaningless
How is the customer data you collect going to be used to meet a business
objective? That is the first question you must ask, says Patricia Aragón León, chief
digital officer at one of the world’s largest cosmetics companies. And the reason
that question is so important is that today we are drowning in data. “We finally have
more than enough data to play with,” says Aragón León. “That creates its own sets
of new challenges. The biggest challenge is ‘info-besity’—incalculable amounts of
data, but not enough bandwidth or time to digest it.”
To address this challenge and to be sure you are spending your resources on
the data that is relevant to your business processes, Aragón León recommends
building these three best practices into the way you collect and use data:
Ask the right business questions: Data comes from many sources, such as points
of sale, ecommerce websites, email, social media, customer care data, ratings or
reviews, and third-party data. But data is not magic. “Each platform has a role and
purpose to fulfil, and consumers behave differently on each of them,” says Aragón
León .
Without key business questions and objectives to provide context for the data
those platforms generate, the data will have no meaning. It just becomes channel
data without a purpose.
With over 10 years of marketing, digital,
e-commerce, content production, data &
analytics, social & traditional media management,
Patricia is an award-winning executive and
recognized thought-leader with a background in
driving brands ranging from the Global Fortune
500’s to private organizations across the retail
and luxury landscape. Patricia is a data-driven,
technology-loving marketing leader, driving digital
transformation in global
and regional markets.
Patricia Aragón León
CDO LATAM for Luxe Division,
L’Oréal
10. 10
Defining business objectives for that
information gives it the context you need
to gain insights from the data.
Listen to what the data is telling you:
Aragón León notes: “The data that will bring value to you depends on what consumer signals are relevant to answering your business
questions.” The purpose of having first-party data, third-party data, brand mentions, followers, consumer databases, or any type of
audience and consumer data is to understand the consumers. With that understanding, you can then add value to their experience and
their lives.
Activate your insights: This requires putting together the right teams, tools, and processes that will enable you to motivate customers
to take the actions you want them to take to improve business outcomes and meet business objectives. You are pulling all your data into
one place so you can clean and enrich it. Aragón León astutely points out that, “An insight is not viable if you are not able to act on it.”
In addition to info-besity, there is a parallel challenge that impacts the way companies collect and use data, that is today’s regulatory
environment, which limits what you can track and how you use what you collect. “In today’s world, you have more data privacy and
more rules of engagement,” says Aragón León. “That makes it harder than ever before for marketing to leverage and use the data they
collect.”
That is why it is so important to make sure that whenever consumers are willing to give you a piece of their data, even if it is through
a third party, or even if you send an email from a purchasing point of sales, you need to keep it relevant. It also puts a premium on
building and maintaining close relationships with consumers.
The overall driver behind personalization will continue to be underlying business objectives. Aragón León says, “any innovation or
transformation in terms of data use and data technology depends first on the purpose of the data and second on the process you will
need to apply to understand the data and act on it.”
“The data that will bring value to you depends on what consumer
signals are relevant to answering your business questions.”
11. 11
KEY POINTS
Without key business objectives to provide context for the data
different platforms generate, the data will have no meaning.
It just becomes channel data without a purpose. Defining business
objectives gives the context you need to gain insights from the data.
Activation requires putting together the right teams, tools,
and processes that will enable you to motivate customers to take
the actions you want them to take to improve business outcomes
and meet business objectives.
1
2
Patricia Aragón León,
CDO LATAM for Luxe Division,
L’Oréal
12. 12
“Digital-native companies have elevated consumer
expectations, and the entire world has to follow
that trend.”
Pankaj Tibrewal is the VP of Product at
Arm Treasure Data. Previously, Pankaj
was at Anaplan where he oversaw product
management and product partnerships.
Pankaj came to Anaplan when Chartcube, a
collaborative BI company Pankaj founded, was
acquired by Anaplan. Prior to this, Pankaj ran
a $350M clothing retail chain where he took
the company through digital transformation
and set it up for a 35%+ growth trajectory.
Previously, Pankaj consulted for McKinsey &
Company where he advised several Fortune
500 companies. Pankaj has an MBA from
Kellogg and MS from UT Austin.
Pankaj Tibrewal,
VP of Product,
Arm Treasure Data
Why a Customer Data Platform Matters
Many large enterprises today are challenged to deliver the level of personalized
engagement their customers want. Digitally native companies such as Facebook,
Netflix, and Uber have transformed consumer expectations. Netflix, for
example, tracks viewing habits and uses that data to recommend shows. Uber
uses customer-movement data to predict where cars will be needed and then
preposition them to reduce customer wait times.
Pankaj Tibrewal, VP of product at Arm Treasure Data, says, “Digital-native
companies have elevated consumer expectations, and the entire world has
to follow that trend.” To develop that kind of personalized approach to their
customers, enterprises must be able to collect large amounts of different data
types from many different sources, put all that data in one place, and then make it
actionable. Tibrewal says there are two aspects of this process that are particularly
challenging for many large enterprises:
1. Scale of data. “These are companies with tens or hundreds of millions of
customers,” he explains, “and they can have many thousands of customer
touch points. This kind of undertaking generates huge amounts of data.” So a
fundamental requirement is a data platform with tremendous capacity to scale.
13. 13
2. Complexity of data. Large enterprises
provide different products and brands
through multiple channels in various
geographies. Brands often have their
own business units, their own customer
engagement strategies, and their own customer touch points. Typically, multiple business units within a large enterprise will engage
and collect different kinds of data on the same customers. “You need a platform that can handle that complexity,” says Tibrewal. The
challenges include being able to share data from different business units to provide a more holistic customer experience across all
brands and to accommodate different regulatory jurisdictions across geographies. Tibrewal points out, “A large company may have
hundreds of teams that could be empowered with this data and insight in hundreds of countries. The complexity of managing data use
across the enterprise is huge. So again, you need a platform that allows you to do that.”
What kind of data platform is the right one to address these challenges? Many business units within the enterprise use email
management platforms or CRM applications to consolidate data and data activation strategies. But these tools lack the capacity and
analytical depth that is needed to create real-time intelligence out of large data flows. “You need a true customer data platform (CDP)
to be able to do that,” Tibrewal says. “You want to create intelligence where all your data resides.
Where you keep all your customer data and where you create the intelligence are super important, and you need a true CDP to do that.”
Only then will the enterprise be able to effectively resolve the identities of customers who may be engaging through hundreds of
different touch points. Without that ID resolution, the enterprise will not be able to offer personalized engagement that is timely and
relevant. It is the only way to break down enterprise data silos to operationalize more sophisticated segmentation strategies and
effective programmatic advertising. Tibrewal notes that, “This is a big data problem that needs a big data platform solution.”
The challenge will only grow as more data sources, such as connected devices, provide even more granular information about
customers. This requires scalability in collecting, analyzing, and activating customer data. “Today companies capture consumer data
at websites. Tomorrow they may be getting it from their cars. To remain competitive, enterprises need to future-proof how they capture
and use customer data.”
“You want to create intelligence where all your data resides.
Where you keep all your customer data and where you create the
intelligence are super important, and you need a true CDP to do that.”
14. 14
KEY POINTS
To develop a personalized approach to their customers, enterprises
must be able to collect large amounts of different data types
from many sources, put all that data in one place,
and then make it actionable.
A CDP is the only way to resolve customer identities across
a complex enterprise with hundreds of teams. It is the only way to
break down data silos and operationalize real-time personalization
strategies. This is a big data problem that needs
a big data platform solution.
1
2
Pankaj Tibrewal,
VP of Product,
Arm Treasure Data
14
15. 15
“If you don’t have clean data, you make a lot of mistakes
when you send things to individuals who aren’t real.”
At The Vitamin Shoppe, Nadina oversees
marketing initiatives including CRM and
advertising, in addition to the company’s
loyalty program and pricing/promotion efforts.
Previously, Nadina launched and scaled best-
in-class brand and customer experiences for
Fortune 500 companies including Estee Lauder,
L’Oréal, and Pfizer. She also held executive
positions within advertising and PR agencies
working with brands such as Unilever, Microsoft,
Target, Kohl’s, and CVS.
Nadina Guglielmetti,
Vice President, General Manager,
The Vitamin Shoppe
You Must Clean Your Data Frequently and Rigorously
Customer data is the fuel that drives retailing. Unlike consumer brands that sell
through retail outlets, direct selling retailers are ideally situated to collect and
retain ownership of their customer data, but getting the most value out of that data
requires a lot of work. “We consolidate our data on a weekly basis,” explains Nadina
Guglielmetti, vice president, GM, marketing at The Vitamin Shoppe. “Every week we
go through a process where we scrub all our data to make sure the information we
have is accurate and not duplicative.”
Data cleansing is critically important for The Vitamin Shoppe. With customer
engagement and transactions occurring in more than 700 store locations as well as
the website and through a mobile app, plus data gathered through email campaigns
that help drive sales and loyalty program membership, these customer touch
points continuously generate enormous amounts of new data. “We have tens of
millions of customer records in our database,” Guglielmetti says. “85% to 90% of our
customers are signed up for a loyalty program.”
Having this data in a robust CRM system enables The Vitamin Shoppe to keep
track of customer preferences at an individual level and provide them with more
personalized engagement.
16. 16
“We track what customers buy from us
and their purchasing behavior, which
gives us critical information about what
interests them,” says Guglielmetti.
With so many touchpoints and so many ways for customers to engage, frequent and rigorous data cleaning is necessary to prevent
the customer database from accumulating a lot of false information that would increase marketing costs and reduce the effectiveness
of campaigns. For example, it’s not uncommon for people to have multiple email addresses and to give different emails in different
engagement channels. Or, people change their email and physical addresses. Guglielmetti says, “If you don’t have clean data, you make
a lot of mistakes when you send things to individuals who aren’t real.” That is why she places such emphasis on maintaining the quality
of customer data.
Weekly data deduping is done with the help of a third-party partner who goes through all the customer data and deduplicates customer
records. Additionally, bi-monthly reverse data appends and frequent demographic appends are part of the data hygiene process.
In addition to maintaining data quality, detailed weekly reports provide key insights into customer trends that affect sales and marketing
strategies. Guglielmetti describes what they look for in their reports: “We track how many customers are cleansed on a weekly basis.
We also report new customers acquired every week because we have an acquisition plan that we try to adhere to, and a goal for the
year. Filling our funnel with customers is critical. We look at lapsed customers and how many customers are activated in our business
every week. We have a rich loyalty program, and we have customer retention goals that we try to stick to, so we look closely at loyalty
program data every week.”
Weekly reports also include activity data, such as average order value, trends in lifetime customer value, trends in online and offline
channel usage, and other analytics. “We have plans for online, offline, and pretty much everywhere we have a mode of selling. So every
week our partner works with us to go through our active and new customers,” says Guglielmetti.
Having this view of customer data has enabled The Vitamin Shoppe to be flexible in its response to market-changing events, such as
the coronavirus, which has affected how shoppers behave and resulted in new operating rules that vary from state to state. “We’re
lucky. We have great vendor partners that help us make very quick changes when necessary,” notes Guglielmetti. “Our goal is really to
help keep our customers informed about what’s going on with us so they can get the things they need.”
“We have plans for online, offline, and pretty much everywhere we
have a mode of selling. So every week our partner works with us
to go through our active and new customers.”
17. 17
KEY POINTS
Frequent data scrubbing maintains data quality. It also provides
regular reports on key trends such as new customer acquisition,
customer retention, channel trends, and purchasing trends.
These are essential insights for meeting business goals.
Having deep insight into actionable customer data increases
flexibility in responding quickly to market-changing events.
1
2
Nadina Guglielmetti,
Vice President, General Manager, Marketing,
The Vitamin Shoppe
17
18. 18
“We will be able to see indicators that a customer is in
the market, and we will be able to re-engage with them
at appropriate moments in their journey.”
Melanie Huet is the EVP, Chief Marketing Officer
at Serta Simmons Bedding. Melanie directs
the Marketing, Innovation, Insights and Trade
Marketing divisions focused on delivering
breakthrough innovation, strengthening
the house of brands and growing portfolio
revenue. In just one-year Melanie has helped
lead the transformation into a consumer led
organization identifying top consumer needs
and launching products designed to motivate
and delight consumers. Melanie has over 20
years of experience in CPG leading turnarounds
on billion dollar brands for Kimberly-Clark, Kraft
Heinz and Unilever.
Melanie Huet,
EVP, Chief Marketing Officer,
Serta Simmons Bedding, LLC
Legacy Data Systems Limit the Value You Can Extract
from Data
Transitioning a legacy enterprise data management system is not an easy process,
but for Melanie Huet, executive VP and chief marketing officer at Serta Simmons
Bedding, it is necessary to gain greater efficiencies and flexibility in executing
marketing strategy.
Serta Simmons sells its major brands through retail outlets. Huet explains, “We
don’t have the sell-through data. We don’t really see the retailer POS data that
would help us understand how our products are performing compared to other
products in the marketplace.” Yet she recognizes the need for developing those
deeper insights, and that is a driving force behind their IT roadmap for modernizing
their customer data platform. “I came out of the consumer products world where
we had much better data and a full understanding of how we were doing so we
could react more quickly,” she says.
Huet notes that they currently collect quite a lot of data from different sources,
including data from market surveys and market research, email marketing, website
data that includes what is being viewed and what devices are being used to view it,
demographic and segmentation data, and social media data.
They now have a direct-to-consumer brand that sells through its website,
19. 19
and a couple of the big established
brands are just beginning to do some
direct sales. The direct sales activities
provide more individualized customer
data.
Although they have a lot of data to work with, legacy data systems stand in the way of getting maximum value from that data. “Some
things are sitting in a data lake, but we are not mining the data lake as well as we could,” Huet says. “We also have plug-ins for some
of the other business process systems, and the email program, where we have customers who have opted in for email, stores its data
in the data lake, but that is managed independently.” These data silos limit how the data can be used, and they can make resolving
customer identity from different touch points difficult. Huet adds, “It depends on how the customers come to us. If they come in via
certain methods, we can resolve their identity, but we can’t necessarily track it across all the touchpoints. One obstacle is that our
legacy brands are on a different system than our direct-to-customer brand. We have some systems integration work to do.”
Huet notes they are actively developing a more robust customer data platform. “We are rolling out several phases,” she says. “One of the
first things is to get the legacy brands on a better platform. Once we’re on that platform, right away we’ll be able to do a lot more.”
Huet believes updating their customer data platform will enable them to do a better job of understanding the lifetime value of a
customer and engaging the customer more effectively. “The purchase cycle is quite long in this product category,” she notes. “We will
be able to see indicators that a customer is in the market, and we will be able to re-engage with them at appropriate moments in their
journey.”
She also sees a more effective use of their marketing tools and resources. “We believe better use of our data will help us optimize our
media and marketing to understand the most effective tools based on the call to action we’re trying to drive,” she explains. “It could be
that we really focus on lower-funnel marketing to convert to purchase, or it could be that we use the analytics to AB copy test and put
our strongest creative out there. Also, we’ve had a lot of discussion around contextually relevant advertising.” Speed of marketing action
is another important objective. “A better data platform would help us quickly get new content up and running,” says Huet. “From a cost
standpoint, there would be a huge efficiency if we could generate more content in-house and then more quickly measure it, cut what’s
not working, and do more of what is working.”
Huet is convinced that the more data they have, the more effective they will be at charting a successful path. Being able to do that
begins with having a solid customer data platform.
“From a cost standpoint, there would be a huge efficiency if we
could generate more content in-house and then more quickly
measure it, cut what’s not working, and do more of what is working.”
20. 20
KEY POINTS
Legacy data systems limit the value of the data you collect
by making it difficult to share data from different brands,
resolve identities across touch points, and use the data
to track true customer journeys.
A customer data platform with good analytics enables more
flexible marketing strategies that focus on particular aspects
of the journey, use real-time testing to optimize engagement,
and develop contextualized advertising.
1
2
Melanie Huet,
EVP, Chief Marketing Officer,
Serta Simmons Bedding, LLC
20
21. 21
“Building a centralized data repository to store more than
three billion records of customer information was our most
pressing task.”
Mark Chiles is the Chief Digital Officer & Senior
Vice President of Digital for Hart Energy.
As Hart’s chief digital officer, Mark coordinates
and leads key digital functions across the
company’s portfolio of world-class brands, while
defining growth areas and entering new markets.
He currently manages information technology,
software engineering, audience development,
digital business development, data intelligence
and new product strategy. New e-commerce,
online marketing, social media, transformative
platforms and cutting edge technology are
just some of the redefining media components
Mark is embracing to continue Hart Energy’s
leadership in providing oil and gas information.
Mark Chiles,
Chief Digital Officer &
Senior Vice President of Digital,
Hart Energy
A Centralized Data Repository Is the Key
Many companies whose business models generate large amounts of customer
data understand their data contains intelligence that can help the business. The
real challenge is how to consolidate that data into a useful resource and what tools
to apply to give you the actionable intelligence you need.
For Mark Chiles, senior vice president and chief digital officer at Hart Energy,
the first step was putting all the data in one place. “Before we implemented our
customer data platform (CDP), our data was scattered across probably a dozen
systems from nearly as many vendors,” Chiles explains. “Our first priority was
to create a data lake that could serve as a historical platform to prevent loss of
valuable data. One of our major digital-marketing vendors notified us of their
intentions to begin retaining only 90 days of data. We expect that the costs of
storage and increasingly stringent regulatory requirements related to personally
identifiable information (PII) may lead other vendors to follow suit. So building a
centralized data repository to store more than three billion records of customer
information was our most pressing task.”
Putting all this data into one centralized repository led to the next challenge,
which was how to process and analyze all that data. Hart Energy’s customer data
platform could now protect historical data and interconnect data sources and
22. 22
marketing tools in a way that scaled
to handle the volume and pace of data
collection. The current database holds
80 tables of data with some data imports
updating daily, and others as frequently
as every hour. “Our marketers use these data sets to develop strategies for promoting a diverse mix of products to equally diverse
audiences,” Chiles says.
The old tools would no longer work with such large, interconnected data sets. “Prior to implementing the CDP, marketers had to rely
heavily on spreadsheets, pivot tables, and institutional knowledge, sifting through large pivot tables and huge spreadsheets to make
sense of information,” Chiles notes. “One table we maintained held more than 370 columns of data. Obviously, it’s nearly impossible to
develop any kind of meaningful rationale from a table that size—spreadsheets are simply no way to run a business.”
Chiles describes use cases enabled by CDP. “We’re now able to track and analyze the subscriber journey across websites and content.
Cross-referencing data from multiple systems helps us identify new opportunities to influence renewals. For example, we can create
detailed usage reports for our corporate subscribers. By showing them more of the reader’s journey, including activities across both
paid-subscription publications and free newsletter content, we can reveal the true value of our content and help businesses make
appropriate renewal decisions. We can also provide similar reports to advertisers.
“In another application, we’re developing a workflow that uses conference-attendee data imported into the repository to activate a
chat feature that allows conference attendees to talk directly with each other. The app accesses the integrated multichannel data
(including event confirmation numbers) and then pushes the appropriate information back out via our web-hosting system to enable
authentication and the networking that allows attendees to communicate with each other. Without the data repository and connectors,
development and maintenance of this app would have been much more complex.”
Analytical tools built into the CDP platform and the platform’s support for customized machine learning algorithms make deeper
analysis possible. Chiles explains how these capabilities have transformed their ability to derive intelligence from their data: “Today we
can take advantage of much more sophisticated audience segmentation. Previously we could only run rudimentary searches to identify
potential campaign targets. If, for example, you wanted to reach out to top management, you had to search for a specific title such
as ‘CEO.’ Today we can quickly query for the full gamut of possible titles—general manager, founder, owner, principal, etc.—that might
identify the top position in a company.” This has opened the door to more sophisticated analysis such as affinity modeling that helps
Hart Energy more effectively promote its portfolio of information and data products across the company’s customer base.
“Overall, we’re gaining a deeper understanding of how our audiences
cross over and expect to use affinity analysis
to create new promotion and sales opportunities.”
23. Chiles explains how the CDP is changing the way they approach their marketing challenges: “Overall, we’re gaining a deeper
understanding of how our audiences cross over and expect to use affinity analysis to create new promotion and sales opportunities.
And we’re continuing to expand our use of the CDP functionality to better understand the customer journey. We expect that predictive
scoring, for example, will help us quantify churn propensity.”
Chiles is also using the CDP platform to support greater personalization strategies in their online customer engagement. He says,
“We’re using a profiles API in our development of a new app that will dynamically populate website content and make personalized
recommendations for site visitors.”
23
KEY POINTS
Marketers sift through huge spreadsheets to make sense of information. This approach
becomes unworkable for large databases. Analytical tools built into a CDP platform and
support for customized machine learning algorithms make deeper analysis possible.
The CDP platform can support greater personalization strategies, such as dynamically
populating website content and making personalized recommendations for site visitors.
1
2
Mark Chiles,
Chief Digital Officer & Senior Vice President of Digital,
Hart Energy
23
24. 24
“Data can come from a number of different sources
and systems within the enterprise. You have to make
sure you have a process to aggregate information.”
Kiran Kumar has spent the past 15 years in
a range of customer-facing roles in large and
complex retail businesses. He has significant
experience in the thoughtful use of data for
analytics, finance and loyalty programs, as
well as for the operations and development of
consumer facing applications.
Kiran Kumar,
Digital Product Management,
Operations and Marketing in Retail,
Leading US Retailers (Various)
Making Customer Data Actionable
Personalized marketing has become an essential strategy for many businesses
working to raise the quality and value of their customer engagements. With his
long experience in digital product management and marketing, Kiran Kumar
points out: “The moment you personalize a campaign, you will see improvements
in customer engagement which can manifest itself in transaction increases,
positive customer feedback and improved loyalty. Personalization improves ROI for
marketing in general.”
Achieving high marketing ROI requires proficiency in managing and
operationalizing data. Operationalizing data is not just about how you deploy
marketing campaigns. “The ability to take action based on data is critical,” says
Kumar. “Data by itself is not useful.” To operationalize data, you must develop an
end-to-end process that includes data collection, hygiene, analytics and activation.
Kumar explains: “If you think about this process as a pipeline, you need to have all
the components of the pipeline working well for anything to flow through.
The data needs to be accessible, you need analytical tools to derive meaning from
the data, and you need tools to take action on what the data tells you. Also, all
these components need to be integrated seamlessly.”
25. 25
Kumar sees a few essential steps to
preparing customer data so that you can
derive actionable meaning from it. These
include:
1. Making sure the data is complete and readily accessible. The data you collect needs to contain the basic elements you require
to achieve your goals. This is fundamental, because the higher the quality of your data and the more data you have, the greater
opportunity you will have to act on it. Data can come from a number of different sources and systems within the enterprise. “You have
to make sure you have a process to aggregate information,” Kumar says. At the same time, he recognizes the challenges of integrating
data that often resides in many places and comes from different sources. He notes, “A lot of companies already have a multitude of
data platforms. Some have a master customer data management platform. The big question is how do you put something together
that will integrate with everything you are doing.”
2. Exercising good data hygiene practices. “This is critical,” says Kumar, “because data elements are often not consistent even though
they are nominally representing the same attributes, or they’re capturing the same behavior differently.” Good data hygiene involves
having the ability to perform quality checks on incoming data and flagging or correcting invalid records. You also need the ability
to merge or link customer accounts, and to make sure that when customers engage, the associated data is directed to an existing
account rather than put into new accounts. A proliferation of records related to each customer makes it more difficult to connect the
dots in the backend, and it increases the future data management burden.
Kumar advises having these data management capabilities before investing heavily in downstream analytical and activation tools.
Platforms with solid data management features and analytical capabilities can help. “A third party platform can get you to market faster
with more features,” Kumar says, “but you will still have to integrate that with in-house platforms.”
“A third party platform can get you to market faster with more
features, but you will still have to integrate that with in-house
platforms.”
26. 26
KEY POINTS
Operationalizing data is not just about how you deploy marketing
campaigns. To operationalize data, you must develop
an end-to-end process that includes data collection,
hygiene, analytics and activation.
Good data hygiene involves having the ability to perform quality
checks on incoming data and flagging or correcting invalid records.
You also need the ability to merge or link customer accounts,
and to make sure that when customers engage, the associated data
is directed to an existing account rather than put into new accounts.
1
2
Kiran Kumar,
Digital Product Management, Operations and Marketing in Retail,
Leading US Retailers (Various)
26