SlideShare a Scribd company logo
1 of 22
&
&
Find Marketing and IT’s
Common Ground
December 2015
Mark Rudolph, CRO, Ghostery
Ari Weil, VP Marketing, YOTTAA
& 2
Marketing and IT: On Two Different Paths
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Only 30% of marketers
and 13% of IT execs
describe their relationship
as ‘collaborative’
• 63% in each group say
they don’t share
incentives
* Source: 2015 CMO Digital Benchmark Survey
& 3
But a slow site has serious business consequences
• According to Aberdeen, every 1-second delay resulted in:
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
11%
Fewer
Page
Views
16%
Decrease
in CSAT
7% loss in
conversion
& 4Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
• Every 100ms of latency costs up to 1% of revenue. *1
• 46% of online shoppers cite checkout speed as the #1 factor in determining
whether they will return to a site. *2
• Estimated cost of mixed content warnings on the top 100 internet retailers is
$310M per annum. *3
• 80% of the digital vendors on a brand’s site are placed there indirectly. *4
*1 Amazon internal study 2013
*2 Radware internal study 2014
*3 Ponemon & Ghostery Mixed Content Warnings Study – April 2015
*4 Ghostery research
*5 Akamai survey 2009
1% 46% $310M 80% 47%
of revenue lost for every
100ms of latency1
of online shoppers that
cited checkout speed as
the #1 factor in
determining whether they
would return to a site2
estimated cost of mixed
content warnings on the
top 100 internet retailers
per annum3
of the digital vendors on a
brand’s site are placed
there indirectly4
of consumers expect a
page to load in 2 seconds
or less5
But Numbers Show They Should Work Closely Together
& 5
Not Managing This Has a Direct Business Impact
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
GLOBAL PRIVACY
COMPLIANCE ISSUES
Lower Revenue
Higher Operational Cost
Negative Brand Perception
PERFORMANCE GOVERNANCE SECURITY PRIVACY
POOR CUSTOMER
EXPERIENCE
WASTED OPERATIONS
TIME (MTTR)
INCREASED
ABANDONMENT RATES
& 6
About Ghostery
• Founded in 2009
• Over 40 Million consumers
rely on Ghostery’s Browser
Extension and Mobile App to
control how their data is
shared online
• Dominant provider of privacy
governance solutions
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 7
Ghostery Allows Safer, Faster, and More Trusted Digital Experiences
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
RETAIL TRAVEL FINANCIAL SERVICES CPG PUBLISHERS TECHNOLOGY
& 8
Ghostery MCM Exposes Long Redirect Chains
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 9
Case Study: A Place For Mom
• Founded 15 years ago to
help families find assisted
living facilities for their
loved ones
• Largest senior living
referral service in the U.S.
and Canada
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 10
Trackermap: BEFORE
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 11
Trackermap: AFTER
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 12
Reduction in Average Tag Count
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
& 13
50% Fewer Vendors + 10% Page Latency Improvement = Better ROI
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
&
YOTTAA Automates Acceleration & Security for Leading Brands
>500WEB APPS
OPTIMIZED
$1BREVENUE
INFLUENCED
& 15
Misalignment: Performance vs. Content Aggregation Points
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Browser CDN Firewall Web Servers
LEGACY
MODERN
DAY
ADCLB
CONTENT
AGGREGATION
EXPERIENCE
OPTIMIZATION
CYBER
SECURITY
CONTENT
ACCELERATION
CONTENT AGGREGATION
DMZ
Servers
DMZ
ADCBrowser
SOCIAL MEDIA
PERSONAL-
IZATION
A/B TESTING
PAYMENT
GATEWAY
RATINGS &
REVIEWS
LOCALIZATION
ADVERTISING USER FEEDBACK
BUSINESS
ANALYTICS
RECOMMEND
CONTENT
eCOMMERCE
PLATFORM
MARKETING
AUTOMATION
APP OPTIMIZATION
ContextIntelligenceTM Platform
INFRASTRUCTURE
IaaS BUILD
PaaS DEVELOP
SaaS EXTEND
AdaptiveCDN
Interchange
ContextAgent
InstantON &
AppSequencing ContextSAFE
& 16
Case Study: Moosejaw
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Internet Retailer Top 500
The Most Fun Retailer on the
Planet
& 17
Commerce Application Development Requires Many Scripts & Tags
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
272
requests
9.2
megabytes
& 18
Requirement: Maintain 100% of content, but accelerate by 40%
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Web
Infrastructure
Browser
ContextIntelligenceTM
Platform
ContextAgentTM
On-device Intelligence
INJECT
SEQUENCE
DELAY
& 19
4D Optimization: Automated Acceleration with Machine Learning
26 Requests Completed in 2 Seconds
To Start Rendering Page
135 Requests Completed in 6 Seconds
To Fully Display Page
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
MACHINE LEARNING
RULES ENGINE
& 20
Benefits of 4D: Faster Pages, Increased Conversions, Full Fidelity
36% Faster
Time to Display
4.6% Lower
Bounce Rate
17% Higher
Conversion Rate
Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Dan Pingree
VP Marketing, Moosejaw
Performance was the main reason we selected Yottaa. A growing
amount of our traffic comes from mobile so it is imperative that
page loading speeds on mobile and tablet devices are as fast as
possible. Yottaa helped us to significantly speed up performance
on these devices resulting in a much better experience for our
customers.
&
&
AT&T
June 2015
Q & A&
& 22Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
Mark Rudolph
Chief Revenue Officer
mark@ghostery.com
@RudyGhostery
Ari Weil
VP of Marketing &
Business Development,
aweil@yottaa.com
@aweil
THANK YOU

More Related Content

What's hot

Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?Colin McGovern
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Cohesive Networks
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...ForgeRock
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity ForgeRock
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machinePriyanka Aash
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessBomgar
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITMatteo Masi
 
Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
 
Fighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceAjeet Singh
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 

What's hot (20)

Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged Access
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed IT
 
Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Fighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and Intelligence
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 

Similar to Marketing and IT Common Ground

2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT DepartmentsYottaa
 
Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery, Inc.
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23AirTight Networks
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues Allot Communications
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retailCloudera, Inc.
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...apidays
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTSAirTight Networks
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...SaaStock
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...Mintigo1
 
lendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLinklendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLinkKristina Quinn
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCloudIDSummit
 
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summits
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
 
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New WorldForgeRock
 

Similar to Marketing and IT Common Ground (20)

2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments2016: The Year to Align Marketing & IT Departments
2016: The Year to Align Marketing & IT Departments
 
Ghostery MCM - May 2016
Ghostery MCM - May 2016Ghostery MCM - May 2016
Ghostery MCM - May 2016
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retail
 
ISG Market Update
ISG Market UpdateISG Market Update
ISG Market Update
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...
Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...
Leverage your Digital Insights to Drive Exceptional Customer Experiences - Sh...
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
[Webinar] Driving The Ultimate Customer Experience With Predictive Marketing ...
 
lendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLinklendingQB: A Mortgage Loan Origination System by MeridianLink
lendingQB: A Mortgage Loan Origination System by MeridianLink
 
The Truth About Mobile Marketing for B2B Companies
The Truth About Mobile Marketing for B2B CompaniesThe Truth About Mobile Marketing for B2B Companies
The Truth About Mobile Marketing for B2B Companies
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
 
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
2015 Identity Summit: How to Maximize Return on Identity in a Brave New World
 

More from Ghostery, Inc.

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorGhostery, Inc.
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery, Inc.
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery, Inc.
 

More from Ghostery, Inc. (6)

The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
Economic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer BehaviorEconomic Impact of Mixed Content Warnings on Consumer Behavior
Economic Impact of Mixed Content Warnings on Consumer Behavior
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Ghostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing CloudGhostery Enterprise - Defining The Marketing Cloud
Ghostery Enterprise - Defining The Marketing Cloud
 
Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White Paper
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Marketing and IT Common Ground

  • 1. & & Find Marketing and IT’s Common Ground December 2015 Mark Rudolph, CRO, Ghostery Ari Weil, VP Marketing, YOTTAA
  • 2. & 2 Marketing and IT: On Two Different Paths Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Only 30% of marketers and 13% of IT execs describe their relationship as ‘collaborative’ • 63% in each group say they don’t share incentives * Source: 2015 CMO Digital Benchmark Survey
  • 3. & 3 But a slow site has serious business consequences • According to Aberdeen, every 1-second delay resulted in: Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 11% Fewer Page Views 16% Decrease in CSAT 7% loss in conversion
  • 4. & 4Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved • Every 100ms of latency costs up to 1% of revenue. *1 • 46% of online shoppers cite checkout speed as the #1 factor in determining whether they will return to a site. *2 • Estimated cost of mixed content warnings on the top 100 internet retailers is $310M per annum. *3 • 80% of the digital vendors on a brand’s site are placed there indirectly. *4 *1 Amazon internal study 2013 *2 Radware internal study 2014 *3 Ponemon & Ghostery Mixed Content Warnings Study – April 2015 *4 Ghostery research *5 Akamai survey 2009 1% 46% $310M 80% 47% of revenue lost for every 100ms of latency1 of online shoppers that cited checkout speed as the #1 factor in determining whether they would return to a site2 estimated cost of mixed content warnings on the top 100 internet retailers per annum3 of the digital vendors on a brand’s site are placed there indirectly4 of consumers expect a page to load in 2 seconds or less5 But Numbers Show They Should Work Closely Together
  • 5. & 5 Not Managing This Has a Direct Business Impact Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved GLOBAL PRIVACY COMPLIANCE ISSUES Lower Revenue Higher Operational Cost Negative Brand Perception PERFORMANCE GOVERNANCE SECURITY PRIVACY POOR CUSTOMER EXPERIENCE WASTED OPERATIONS TIME (MTTR) INCREASED ABANDONMENT RATES
  • 6. & 6 About Ghostery • Founded in 2009 • Over 40 Million consumers rely on Ghostery’s Browser Extension and Mobile App to control how their data is shared online • Dominant provider of privacy governance solutions Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 7. & 7 Ghostery Allows Safer, Faster, and More Trusted Digital Experiences Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved RETAIL TRAVEL FINANCIAL SERVICES CPG PUBLISHERS TECHNOLOGY
  • 8. & 8 Ghostery MCM Exposes Long Redirect Chains Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 9. & 9 Case Study: A Place For Mom • Founded 15 years ago to help families find assisted living facilities for their loved ones • Largest senior living referral service in the U.S. and Canada Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 10. & 10 Trackermap: BEFORE Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 11. & 11 Trackermap: AFTER Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 12. & 12 Reduction in Average Tag Count Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 13. & 13 50% Fewer Vendors + 10% Page Latency Improvement = Better ROI Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved
  • 14. & YOTTAA Automates Acceleration & Security for Leading Brands >500WEB APPS OPTIMIZED $1BREVENUE INFLUENCED
  • 15. & 15 Misalignment: Performance vs. Content Aggregation Points Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Browser CDN Firewall Web Servers LEGACY MODERN DAY ADCLB CONTENT AGGREGATION EXPERIENCE OPTIMIZATION CYBER SECURITY CONTENT ACCELERATION CONTENT AGGREGATION DMZ Servers DMZ ADCBrowser SOCIAL MEDIA PERSONAL- IZATION A/B TESTING PAYMENT GATEWAY RATINGS & REVIEWS LOCALIZATION ADVERTISING USER FEEDBACK BUSINESS ANALYTICS RECOMMEND CONTENT eCOMMERCE PLATFORM MARKETING AUTOMATION APP OPTIMIZATION ContextIntelligenceTM Platform INFRASTRUCTURE IaaS BUILD PaaS DEVELOP SaaS EXTEND AdaptiveCDN Interchange ContextAgent InstantON & AppSequencing ContextSAFE
  • 16. & 16 Case Study: Moosejaw Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Internet Retailer Top 500 The Most Fun Retailer on the Planet
  • 17. & 17 Commerce Application Development Requires Many Scripts & Tags Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved 272 requests 9.2 megabytes
  • 18. & 18 Requirement: Maintain 100% of content, but accelerate by 40% Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Web Infrastructure Browser ContextIntelligenceTM Platform ContextAgentTM On-device Intelligence INJECT SEQUENCE DELAY
  • 19. & 19 4D Optimization: Automated Acceleration with Machine Learning 26 Requests Completed in 2 Seconds To Start Rendering Page 135 Requests Completed in 6 Seconds To Fully Display Page Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved MACHINE LEARNING RULES ENGINE
  • 20. & 20 Benefits of 4D: Faster Pages, Increased Conversions, Full Fidelity 36% Faster Time to Display 4.6% Lower Bounce Rate 17% Higher Conversion Rate Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Dan Pingree VP Marketing, Moosejaw Performance was the main reason we selected Yottaa. A growing amount of our traffic comes from mobile so it is imperative that page loading speeds on mobile and tablet devices are as fast as possible. Yottaa helped us to significantly speed up performance on these devices resulting in a much better experience for our customers.
  • 22. & 22Private & Confidential | © 2015 Ghostery, Inc. All Rights Reserved Mark Rudolph Chief Revenue Officer mark@ghostery.com @RudyGhostery Ari Weil VP of Marketing & Business Development, aweil@yottaa.com @aweil THANK YOU

Editor's Notes

  1. Our Trackermap exposes tags making extended calls on your website. These long redirect
  2. Yottaa has been accelerating and security web and mobile apps since 2009. Our solution is deployed at 150 Enterprises across the globe and performs real-time optimizations for > 500 apps, influencing over $1bn in revenue for our customers. Those customers include 13 of the Internet Retailer top 500, 26 of the Internet Retailer top 1000, and 75 businesses with an Alexa rank under 5000. Yottaa is proven to be the fastest and most complete app acceleration solution in the industry, speeding up rendering and visitor flows by 40% or more. SEGUE: So what makes Yottaa unique?
  3. e.g. all.js widgets.js ig-follow.js tag.js magpie.js www.googlecommerce.com/trustedstores
  4. Widget.JS is a framework that provides routing, events and stateful widgets to JS Apps.