In 2004 you had a website. In 2014, you have a marketing cloud. You interact with your customers across thousands of channels and device types and rely on hundreds of vendor partners to do so. If you are like most enterprises, your marketing cloud is out of control. An out-of-control cloud sends customers to competitors’ stores, dilutes your customer data value, opens security breaches, and slows down your site. Good cloud management ensures that you keep and grow your customer base, secure your data, and improve site performance.
In this research series, we will define the marketing cloud and provide benchmark data and best practices for marketing cloud management. This is part two of the three-part series.
• Defining the Marketing Cloud
• Marketing Cloud Management: Best Practices
• Benchmarking Your Marketing Cloud
DIGITAL SECURITY IS SERIOUS BUSINESS
The number of publicly traded companies that listed security issues as a business risk in securities filings increased by 73% from 2012 to 2014.
The average cost of a breach is $200 per record, which amounts to an average of $5.9 million paid by organizations per breach.
"Security has never been higher on the agenda of CEO's and Boards. This study shows that companies can generate additional revenue while closing security gaps from non-secure marketing technology on their secure pages.”
Caroline Watteeuw, the former Global Chief Technology Officer and SVP of Business Information Solutions of Pepsico and an advisor to Ghostery, Inc.
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsJeremiah Grossman
One of the only guarantees in life is that the first time you analyze a piece of software for security vulnerabilities, you're going to find them. Whether you’re using static or dynamic analysis, prioritizing defects for remediation can strain any organization. This session will demonstrate methods for integrating analysis techniques and show how a combined approach gives better results.
Investors sharply reduce their post-close valuations of companies that have completed acquisitions when data breaches are revealed.
Brunswick’s third annual data valuation survey also found that investors raise their post-deal valuations for companies that have demonstrated preparation for cybersecurity issues.
The survey results, which reflect the views of 208 buy-side investors and sell-side analysts across the US, UK, Europe, and Asia, offered good news for companies taking steps to address cybersecurity issues.
For more information please contact our Washington DC office:
www.brunswickgroup.com/contact-us/washington-dc/
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
Ever notice how everything in InfoSec is sold “as is”? No guarantees, no warrantees, no return policies. For some reason in InfoSec, providing customers with a form of financial coverage for their investment is seen as gimmicky, but the tides and times are changing. This talk discusses use cases on why guarantees are a must have and how guarantees benefit customers as well as InfoSec as a whole.
Data breaches and theft of user information can do crippling damage to a digital media company. Creating an effective cybersecurity program is a critical step.
The next 10 years in FinTech by Philippe Gelis from KantoxTheFamily
We're thrilled to welcome a very special guest:
Philippe Gelis, cofounder & CEO at Kantox!
We hear a lot of talk about the future of Fintech, and who better to give his take on the subject than the cofounder & CEO of one of its top performers?
You've probably heard about Kantox, the P2P currency exchange platform with 1600 clients in over 20 geographic locations. This startup focuses on SMEs and mid-cap companies, providing them with a solution that has historically only been available to the largest of organizations.
Kantox announced last September that they had reached over $2 billion in total transactions on the platform. With their $11 M Series B round raised last May, we can say things are looking pretty good for Kantox ;)
Philippe cofounded Kantox, one of the first Fintech startups, back in 2011. He began his career working for Renault Suisse as a financial controller. He then gained invaluable experience in the banking industry as a consultant. Before founding Kantox, he was strategy & management consultant at Deloitte. He is specialized in corporate finance and business strategy.
In this 45 min. talks on the future of Fintech, Philippe gives his analysis of the current state of the industry and the major trends to follow during the next 10 years.
LOVE,
TheFamily Team
DIGITAL SECURITY IS SERIOUS BUSINESS
The number of publicly traded companies that listed security issues as a business risk in securities filings increased by 73% from 2012 to 2014.
The average cost of a breach is $200 per record, which amounts to an average of $5.9 million paid by organizations per breach.
"Security has never been higher on the agenda of CEO's and Boards. This study shows that companies can generate additional revenue while closing security gaps from non-secure marketing technology on their secure pages.”
Caroline Watteeuw, the former Global Chief Technology Officer and SVP of Business Information Solutions of Pepsico and an advisor to Ghostery, Inc.
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsJeremiah Grossman
One of the only guarantees in life is that the first time you analyze a piece of software for security vulnerabilities, you're going to find them. Whether you’re using static or dynamic analysis, prioritizing defects for remediation can strain any organization. This session will demonstrate methods for integrating analysis techniques and show how a combined approach gives better results.
Investors sharply reduce their post-close valuations of companies that have completed acquisitions when data breaches are revealed.
Brunswick’s third annual data valuation survey also found that investors raise their post-deal valuations for companies that have demonstrated preparation for cybersecurity issues.
The survey results, which reflect the views of 208 buy-side investors and sell-side analysts across the US, UK, Europe, and Asia, offered good news for companies taking steps to address cybersecurity issues.
For more information please contact our Washington DC office:
www.brunswickgroup.com/contact-us/washington-dc/
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
Ever notice how everything in InfoSec is sold “as is”? No guarantees, no warrantees, no return policies. For some reason in InfoSec, providing customers with a form of financial coverage for their investment is seen as gimmicky, but the tides and times are changing. This talk discusses use cases on why guarantees are a must have and how guarantees benefit customers as well as InfoSec as a whole.
Data breaches and theft of user information can do crippling damage to a digital media company. Creating an effective cybersecurity program is a critical step.
The next 10 years in FinTech by Philippe Gelis from KantoxTheFamily
We're thrilled to welcome a very special guest:
Philippe Gelis, cofounder & CEO at Kantox!
We hear a lot of talk about the future of Fintech, and who better to give his take on the subject than the cofounder & CEO of one of its top performers?
You've probably heard about Kantox, the P2P currency exchange platform with 1600 clients in over 20 geographic locations. This startup focuses on SMEs and mid-cap companies, providing them with a solution that has historically only been available to the largest of organizations.
Kantox announced last September that they had reached over $2 billion in total transactions on the platform. With their $11 M Series B round raised last May, we can say things are looking pretty good for Kantox ;)
Philippe cofounded Kantox, one of the first Fintech startups, back in 2011. He began his career working for Renault Suisse as a financial controller. He then gained invaluable experience in the banking industry as a consultant. Before founding Kantox, he was strategy & management consultant at Deloitte. He is specialized in corporate finance and business strategy.
In this 45 min. talks on the future of Fintech, Philippe gives his analysis of the current state of the industry and the major trends to follow during the next 10 years.
LOVE,
TheFamily Team
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
WhiteHat Security’s Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely.
Website security is an ever-moving target. New website launches are common, new code is released constantly, new web technologies are created and adopted every day; as a result, new attack techniques are frequently disclosed that can put every online business at risk. In order to stay protected, enterprises must receive timely information about how they
can most efficiently defend their websites, gain visibility into
the performance of their security programs, and learn how they compare with their industry peers. Obtaining these insights
is crucial in order to stay ahead and truly improve enterprise website security.
To help, WhiteHat Security has been publishing its Website Security Statistics Report since 2006. This report is the only one that focuses exclusively on unknown vulnerabilities in custom web applications, code that is unique to an organization, and found in real-world websites. The underlying data is hundreds of terabytes in size, comprises vulnerability assessment results from tens of thousands of websites across hundreds of the most well- known organizations, and collectively represents the largest and most accurate picture of website security available. Inside this report is information about the most prevalent vulnerabilities, how many get fixed, how long the fixes can take on average, and how every application security program may measurably improve. The report is organized by industry, and is accompanied by WhiteHat Security’s expert analysis and recommendations.
How Innovation Is Disrupting the Insurance MarketplaceCapgemini
As digital and data become key innovation enablers, insurers face new threats and opportunities. New entrants are disrupting long standing paradigms of how insurance risk is assessed, how products are distributed, and how insurers service customers.
Digitalization and Analytics acquire new strategic relevance in this context and will fundamentally alter the relationship insurers have with customers and agents. This panel will discuss some of these trends and options available to insurers to address these opportunities.
Presented at Pegaworld 2016.
Pandemic has taken a fair share of the toll on every economy, affecting millions of businesses across the globe. As organizations are adopting technology and innovation to fulfil their quest for growth, they must comprehend, the ghost of cyberattack will come to haunt them sooner or later. Cyber breaches will not only cause brand degradation, but also lead to loss of digital assets, and change in consumer behaviour. As a result, companies are considering corporate cyber insurance as a part of their cybersecurity strategies. Click on the link to read what cyber insurance is and why companies direly need it.
Appinions Information Technology Influence Study_August 2013Appinions
This report explores the companies and executives who are shaping influential conversations in enterprise software.
The study is based on 60 days of data taken between June 4 and August 2, 2013. The scope of this report is based on the most compelling issues around IT, exploring the most influential topics as defined by the upcoming Interop New York conference: Cloud Computing, Big Data, SaaS, Network Infrastructure, Information Security and BYOD.
Go digital or die. Are Middle East insurers ready?Olivier Bauchart
How quickly would they go in adopting the right digital/business transformation? How far would they go? What would the enablers be? What would the benefits be in doing so…but why would they embark on this journey in the first place? How would an aggregator manage to attract global brands to enrich their panels and increase their conversion rate?
As far as eCommerce, Online Insurance and Aggregators are concerned, let’s structure this outlook in 3 sections spanning Market Reality, Digital Transformation and Business Transformation.
Web security is a moving target and enterprises need timely information about the latest attack trends, how they can best defend their websites, and visibility into their vulnerability lifecycle. Through its Software-as-a-Service (SaaS) offering, WhiteHat Sentinel, WhiteHat Security is uniquely positioned to deliver the knowledge and solutions that organizations need to protect their brands, attain PCI compliance and avert costly breaches.
The WhiteHat Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address to safely conduct business online. WhiteHat has been publishing the report, which highlights the top ten vulnerabilities, tracks vertical market trends and identifies new attack techniques, since 2006.
The WhiteHat Security report presents a statistical picture of current website vulnerabilities, accompanied by WhiteHat expert analysis and recommendations. WhiteHat’s report is the only one in the industry to focus solely on unknown vulnerabilities in custom Web applications, code unique to an organization,
European public and policy elite views of US tech companies
This presentation explores consumer attitudes to US tech companies in France, Germany, the UK and Brussels, how that interacts with media coverage, and what is driving the European regulatory agenda towards the internet and technology companies.
For more information please contact:
Chris Blundell: http://www.brunswickgroup.com/people/directory/chris-blundell/
Philippe Blanchard: http://www.brunswickgroup.com/people/directory/philippe-blanchard/
Here is the next edition of Red Door’s MindSHARE – Staying Secure Online. This information comes from the minds of security experts. It is the product of intense research, field experience and considerable expertise. We are happy to share this with you—Red Door MindSHARE is a resource through which you can leverage knowledge to learn about the latest trends for staying secure online.
Our MindSHAREs are easy to read and fun, and you’re guaranteed to find something you can really use.
By reading this, you will:
- Learn how to protect cloud infrastructure from data breaches
- Learn what brands must do to protect consumer data
- Find out the key things you need to know about data breaches from a legal perspective
- View a Cyber and Privacy Risk Infographic
We’re leaking, and everything’s fine: How and why companies deliberately leak...Ian McCarthy
Although the protection of secrets is often vital to the survival of organizations, at other times organizations can benefit by deliberately leaking secrets to outsiders. We explore how and why this is the case. We identify two dimensions of leaks: (1) whether the information in the leak is factual or concocted and (2) whether leaks are conducted overtly or covertly. Using these two dimensions, we identify four types of leaks: informing, dissembling, misdirecting, and provoking. We also provide a framework to help managers decide whether or not they should leak secrets.
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
How are insurance companies faring when it comes to protecting their assets and their customers from fraud, malware, cyber attacks and a host of other security breaches? The question is important. Insurance companies hold a vast amount of data
including personally identifiable information, personal health information, credit card and bank account data, and trade secrets (their own and sometimes their clients’). Insurers
have a very distributed model for servicing, increasing the risk across the value chain. Aging legacy systems complicate matters even more.
Digital has increased businesses’ cybersecurity risk – and yet few have elevated security to a senior leadership concern, according to our recent research. Here’s what businesses are thinking about cybersecurity, and a framework for strengthening their security strategies.
Encuesta Mundial de Ciberseguridad de la Información 2017PwC España
Desde 2012, el presupuesto medio que las empresas dedican a ciberseguridad en el mundo casi se ha duplicado, pasando de 2,8 a 5,1 millones de dólares. En España, la inversión de las compañías en seguridad de la información ha seguido una evolución parecida –ha pasado de 3,1 a 3,9 millones de dólares de media- aunque algo más moderada. Todos los detalles en: http://www.pwc.es/es/digital/encuesta-mundial-estado-seguridad-informacion-2017.html.html
Intro to Digital Marketing - ClickZ Live Hong Kong 2014MWI Hong Kong
Slides from Joshua Steimle's presentation at ClickZ Live Hong Kong on digital marketing fundamentals. A high level view of SEO, social media, and online PR. Includes case studies and actionable tips based on Steimle's experience as a writer for Forbes and other publications.
Innovation in Insurance - necessity or luxury?Mateusz Maj
So the world is changing at bewildering speed and we are facing an economic and digital revolution. To manage that change, countries and communities need to change the way we do business and insurance industry cannot ignore these changes. Learn why.
Conversant seven myths that senior marketers need to stop believingJim Nichols
Seven of the biggest digital myths that hold brands back from generating stronger ROI. Entertaining and easy to read, with concrete advice on the right way to approach new digital challenges.
The Revenue Operations to Revenue Acceleration Framework Every Modern Busines...RocketSource
There is no silver bullet that can get brands to revenue acceleration. Instead, companies have to build a strong revenue operations infrastructure based on empathetic customer experience initiatives, intelligent data ops, and innovative content generation. Once you start with the end in mind, your organization can get to a sustainable — and much more feasible — revenue acceleration solution.
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
WhiteHat Security’s Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely.
Website security is an ever-moving target. New website launches are common, new code is released constantly, new web technologies are created and adopted every day; as a result, new attack techniques are frequently disclosed that can put every online business at risk. In order to stay protected, enterprises must receive timely information about how they
can most efficiently defend their websites, gain visibility into
the performance of their security programs, and learn how they compare with their industry peers. Obtaining these insights
is crucial in order to stay ahead and truly improve enterprise website security.
To help, WhiteHat Security has been publishing its Website Security Statistics Report since 2006. This report is the only one that focuses exclusively on unknown vulnerabilities in custom web applications, code that is unique to an organization, and found in real-world websites. The underlying data is hundreds of terabytes in size, comprises vulnerability assessment results from tens of thousands of websites across hundreds of the most well- known organizations, and collectively represents the largest and most accurate picture of website security available. Inside this report is information about the most prevalent vulnerabilities, how many get fixed, how long the fixes can take on average, and how every application security program may measurably improve. The report is organized by industry, and is accompanied by WhiteHat Security’s expert analysis and recommendations.
How Innovation Is Disrupting the Insurance MarketplaceCapgemini
As digital and data become key innovation enablers, insurers face new threats and opportunities. New entrants are disrupting long standing paradigms of how insurance risk is assessed, how products are distributed, and how insurers service customers.
Digitalization and Analytics acquire new strategic relevance in this context and will fundamentally alter the relationship insurers have with customers and agents. This panel will discuss some of these trends and options available to insurers to address these opportunities.
Presented at Pegaworld 2016.
Pandemic has taken a fair share of the toll on every economy, affecting millions of businesses across the globe. As organizations are adopting technology and innovation to fulfil their quest for growth, they must comprehend, the ghost of cyberattack will come to haunt them sooner or later. Cyber breaches will not only cause brand degradation, but also lead to loss of digital assets, and change in consumer behaviour. As a result, companies are considering corporate cyber insurance as a part of their cybersecurity strategies. Click on the link to read what cyber insurance is and why companies direly need it.
Appinions Information Technology Influence Study_August 2013Appinions
This report explores the companies and executives who are shaping influential conversations in enterprise software.
The study is based on 60 days of data taken between June 4 and August 2, 2013. The scope of this report is based on the most compelling issues around IT, exploring the most influential topics as defined by the upcoming Interop New York conference: Cloud Computing, Big Data, SaaS, Network Infrastructure, Information Security and BYOD.
Go digital or die. Are Middle East insurers ready?Olivier Bauchart
How quickly would they go in adopting the right digital/business transformation? How far would they go? What would the enablers be? What would the benefits be in doing so…but why would they embark on this journey in the first place? How would an aggregator manage to attract global brands to enrich their panels and increase their conversion rate?
As far as eCommerce, Online Insurance and Aggregators are concerned, let’s structure this outlook in 3 sections spanning Market Reality, Digital Transformation and Business Transformation.
Web security is a moving target and enterprises need timely information about the latest attack trends, how they can best defend their websites, and visibility into their vulnerability lifecycle. Through its Software-as-a-Service (SaaS) offering, WhiteHat Sentinel, WhiteHat Security is uniquely positioned to deliver the knowledge and solutions that organizations need to protect their brands, attain PCI compliance and avert costly breaches.
The WhiteHat Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address to safely conduct business online. WhiteHat has been publishing the report, which highlights the top ten vulnerabilities, tracks vertical market trends and identifies new attack techniques, since 2006.
The WhiteHat Security report presents a statistical picture of current website vulnerabilities, accompanied by WhiteHat expert analysis and recommendations. WhiteHat’s report is the only one in the industry to focus solely on unknown vulnerabilities in custom Web applications, code unique to an organization,
European public and policy elite views of US tech companies
This presentation explores consumer attitudes to US tech companies in France, Germany, the UK and Brussels, how that interacts with media coverage, and what is driving the European regulatory agenda towards the internet and technology companies.
For more information please contact:
Chris Blundell: http://www.brunswickgroup.com/people/directory/chris-blundell/
Philippe Blanchard: http://www.brunswickgroup.com/people/directory/philippe-blanchard/
Here is the next edition of Red Door’s MindSHARE – Staying Secure Online. This information comes from the minds of security experts. It is the product of intense research, field experience and considerable expertise. We are happy to share this with you—Red Door MindSHARE is a resource through which you can leverage knowledge to learn about the latest trends for staying secure online.
Our MindSHAREs are easy to read and fun, and you’re guaranteed to find something you can really use.
By reading this, you will:
- Learn how to protect cloud infrastructure from data breaches
- Learn what brands must do to protect consumer data
- Find out the key things you need to know about data breaches from a legal perspective
- View a Cyber and Privacy Risk Infographic
We’re leaking, and everything’s fine: How and why companies deliberately leak...Ian McCarthy
Although the protection of secrets is often vital to the survival of organizations, at other times organizations can benefit by deliberately leaking secrets to outsiders. We explore how and why this is the case. We identify two dimensions of leaks: (1) whether the information in the leak is factual or concocted and (2) whether leaks are conducted overtly or covertly. Using these two dimensions, we identify four types of leaks: informing, dissembling, misdirecting, and provoking. We also provide a framework to help managers decide whether or not they should leak secrets.
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
How are insurance companies faring when it comes to protecting their assets and their customers from fraud, malware, cyber attacks and a host of other security breaches? The question is important. Insurance companies hold a vast amount of data
including personally identifiable information, personal health information, credit card and bank account data, and trade secrets (their own and sometimes their clients’). Insurers
have a very distributed model for servicing, increasing the risk across the value chain. Aging legacy systems complicate matters even more.
Digital has increased businesses’ cybersecurity risk – and yet few have elevated security to a senior leadership concern, according to our recent research. Here’s what businesses are thinking about cybersecurity, and a framework for strengthening their security strategies.
Encuesta Mundial de Ciberseguridad de la Información 2017PwC España
Desde 2012, el presupuesto medio que las empresas dedican a ciberseguridad en el mundo casi se ha duplicado, pasando de 2,8 a 5,1 millones de dólares. En España, la inversión de las compañías en seguridad de la información ha seguido una evolución parecida –ha pasado de 3,1 a 3,9 millones de dólares de media- aunque algo más moderada. Todos los detalles en: http://www.pwc.es/es/digital/encuesta-mundial-estado-seguridad-informacion-2017.html.html
Intro to Digital Marketing - ClickZ Live Hong Kong 2014MWI Hong Kong
Slides from Joshua Steimle's presentation at ClickZ Live Hong Kong on digital marketing fundamentals. A high level view of SEO, social media, and online PR. Includes case studies and actionable tips based on Steimle's experience as a writer for Forbes and other publications.
Innovation in Insurance - necessity or luxury?Mateusz Maj
So the world is changing at bewildering speed and we are facing an economic and digital revolution. To manage that change, countries and communities need to change the way we do business and insurance industry cannot ignore these changes. Learn why.
Conversant seven myths that senior marketers need to stop believingJim Nichols
Seven of the biggest digital myths that hold brands back from generating stronger ROI. Entertaining and easy to read, with concrete advice on the right way to approach new digital challenges.
The Revenue Operations to Revenue Acceleration Framework Every Modern Busines...RocketSource
There is no silver bullet that can get brands to revenue acceleration. Instead, companies have to build a strong revenue operations infrastructure based on empathetic customer experience initiatives, intelligent data ops, and innovative content generation. Once you start with the end in mind, your organization can get to a sustainable — and much more feasible — revenue acceleration solution.
Revenue Operations Analytics: A Strategic BlueprintKwanzoo Inc
The true value in your KPIs is understanding how they complete the bigger picture of the customer journeys that drive the most impact for your business.
Marketers need digital asset creation to be collaborative so that assets can be reused and repurposed efficiently across multiple channels. That collaboration is only possible with a process that is powered by the marketers themselves. This new, agile process must be focused on the creation, publishing, re-use, and measurement of rich media, as opposed to finding, limiting, governing, and archiving assets. Discover how agile teams, assets, and processes can create collaborative content, better brands, and faster content marketing.
Digital Transformation and the Marketing ProfessionalMatthew W. Bowers
Defining and understanding digital transformation and the marketing role. How can marketing drive transformation? what are the tasks, strategies and things that can help.
ClickZ has launched an innovative new series of buyers guides, created with the aim of cutting through the complexity of the technology landscape to help our community of readers make better decisions about vendors. The first of this series is dedicated to bid management platforms, which help brands maximize the returns on their PPC, social media, and display advertising budgets.
The role of a bid management platform has changed significantly over the past decade, in line with the increased sophistication of the digital media industry. With over $90 billion spent on paid search in 2017, these software packages play a vital role in deriving maximum value from a brand’s digital media budget.
The core component of the ClickZ bid management vendor guide is our customer survey, which received over 1,600 responses.
Despite a steady stream of changes and often volatile shifts in ranking/position, the state of the search marketing industry remains strong. According to the Search Engine Marketing Professional Organization’s (SEMPO) 10th State of the Industry report, which surveyed more than 500 digital marketers and agencies about their online marketing activities across
digital channels, search engine optimization (SEO) is the most prevalent marketing activity for 94 percent of individual marketers/clients and 92 percent of agencies – significantly higher than when the survey was conducted in 2013 http://withDrDavid.com Search-based advertising is also top of mind with today’s enterprises, with 84 percent of agencies/consultants and 83 percent of marketers/clients indicating they run paid campaigns.
Ghostery Enterprise - Defining The Marketing CloudGhostery, Inc.
You no longer have a website, you have a marketing cloud.
In 2004 you had a website. In 2014, you have a marketing cloud. You interact with your customers across various channels and device types, and rely on hundreds of vendor partners to do so. If you are like most enterprises, your marketing cloud is sub-optimally controlled. A poorly controlled cloud can cause you to send customers to competitors, dilute your customer data value, open security breaches, and slow down your site. Good cloud management ensures that you keep and grow your customer base, secure data, and improve site performance.
In this research series, we will be defining the marketing cloud and providing benchmark data and best practices for marketing cloud management. This is part one of the three part series.
Defining the Marketing Cloud
Benchmarking Your Marketing Cloud
Marketing Cloud Management: Best Practices
iProspect's Future Focus 2018: The New Machine RulesiProspect
It's time to Focus on the Future. Based on interviews with over 250 global advertisers, we address the biggest trends you need to master in order to be prepared for The New Machine Rules. Download your copy now: http://bit.ly/2AirbwR
Becoming Customer Centric: A Business and IT RoadmapPlus Consulting
The rapid rise of global competition, combined with the adoption of Internet-based communications and cloud processing power, has created a state of hypercompetition across most industries. The antidote? Become customer centric. Here's a brief business and IT roadmap to make it happen.
Economic Impact of Mixed Content Warnings on Consumer BehaviorGhostery, Inc.
Ghostery engaged Ponemon Institute to independently determine the economic impact of mixed content
warnings. Specifically, we designed and fielded an experimental study that tests consumer reactions to
mixed content warnings when browsing secure e-commerce sites.
We utilized scientific sampling methods to recruit a representative sample of adult-aged consumers (a.k.a.
respondents) located in the United States. Table 1 summarizes our survey response. We achieved a final
sample of 1,577 qualified respondents or a 3.4 response rate. This experiment was conducted over a two week
period ending in March 2015.
DIGITAL SECURITY IS SERIOUS BUSINESS
The number of publicly traded companies that listed security issues as a business risk in securities filings increased by 73% from 2012 to 2014.
The average cost of a breach is $200 per record, which amounts to an average of $5.9 million paid by organizations per breach.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
1. Emily Riley, COO, Ghostery
10 East 39th Street, 8th Floor, New York, NY 10016 Ι 917.262.2530 Ι ghosteryenterprise.com
sales@ghostery.com Ι @ghosteryinc
MARKETING CLOUD MANAGEMENT BEST PRACTICES
2. 1
YOU NO LONGER HAVE A WEBSITE;
YOU HAVE A MARKETING CLOUD.
In 2004 you had a website. In 2014, you have a marketing cloud.
You interact with your customers across thousands of channels
and device types and rely on hundreds of vendor partners to
do so. If you are like most enterprises, your marketing cloud
is out of control. An out-of-control cloud sends customers to
competitors’ stores, dilutes your customer data value, opens
security breaches, and slows down your site. Good cloud
management ensures that you keep and grow your customer
base, secure your data, and improve site performance.
In this research series, we will define the marketing cloud and
provide benchmark data and best practices for marketing cloud
management. This is part two of the three-part series.
• Defining the Marketing Cloud
• Marketing Cloud Management: Best Practices
• Benchmarking Your Marketing Cloud
3. 2
Marketing departments are
in the middle of a spending
frenzy. eMarketer predicts
worldwide digital ad spending
to reach $137.53 billion in
2014, an all-time high.1 Of
course, marketers are not
just buying ad space with
their money. Laura McLellan
of Gartner estimates that
CMOs will spend more on
technology than CIOs by 2017.
While digital marketing in
particular holds great promise,
without proper management,
it is risky at best, and hugely
unprofitable at worst.
Ghostery finds that a long list
of digital marketing vendors
have worked their way into a
company’s digital assets, often
indirectly through relationships
with other vendors. The
average enterprise site has
more than 75 vendors on
it, only 20% of which are
directly placed by someone
at the company. All digital
marketing vendors bring real
risks and costs to a company’s
online business, including
data security breaches, poor
website performance, and
data leakage to competitors.
These problems will only
continue to rise in time.
According to a study by the
Corporate Executive Board
(CEB), more than 70 percent
of executives are now willing
to run their own technology
projects, partly due to changes
in the ease of data integration
and user interface design,
further challenging Corporate
IT’s monopoly as the internal
arbiter of technology.2
MARKETING CLOUD MANAGEMENT IS AN
ENTERPRISE DISCIPLINE
1 “Digital Ad Spending Worldwide to Hit $137.53 Billion in 2014,” eMarketer, 4/3/2014
2 “Executive Guidance, Harness Business-Led IT,” Corporate Executive Board, Q2 2014
“The average enterprise site has more than 75
vendors on it, only 20% of which are directly placed
by someone at the company.” - Ghostery
4. 3
The first person in an
enterprise to notice problems
caused by vendors is often
someone responsible
for maximizing online
performance for the business.
After noticing that his sites
were slowing down, Martin
Van Der Meij, Head of Revenue
Development at De Telegraaf,
looked into the matter.
His analysis revealed that
“ironically, it was an individual
campaign that Telegraaf had
sold directly that was leading
to a larger proliferation
of unknown tags — and
consequently, slower pages.”
Chad Westfall, Director of Web
Delivery for InterContinental
Hotels Group (IHG), similarly
noticed that a marketing
technology was causing
problems that needed to
be addressed. “Being a
leader in marketing cloud
management became a
priority for our business
last year as we realized the
effort held benefits across
IT, marketing, legal and
security,” Westfall said. Other
early movers like Procter &
Gamble are considering ways
to decrease the company-wide
costs of working
with so many marketing
technology partners.
When individual issues from
digital vendors start to add up,
it is a sign that the problem
is systemic. IT-oriented
leaders who support these
marketing technologies
are the logical leaders of
marketing cloud management,
but departments must work
together to weigh the costs
against the benefits of working
with various partners. As
Accenture’s annual CMO
Insights survey illustrates,
smart CMO’s are leveraging
their IT counterparts’
technical expertise to
improve the overall value
of their digital spend.3
“Being a leader in marketing cloud management became a
priority for our business last year as we realized the effort
held benefits across IT, marketing, legal and security.”
- Chad Westfall, Director of Web Delivery,
InterContinental Hotels Group
3 “CMO’s Time for Digital Transformation,” Accenture, 2014
5. 4
The first step a company
should take to evaluate the
costs and benefits of its
marketing cloud is to audit
digital vendors and see how
those vendors gained access
to the cloud. As Chad Westfall
of IHG explains, an audit of
all third parties across the
company’s sites determined
“who owned each and how
they got to our properties.
This very much helped us to
police which digital vendors
should be on our sites, who
they are allowed to bring with
them, and, most importantly,
how each vendor fits into our
overall website strategy. The
auditing also helped us
identify any slow tags and
benchmark how they perform
across the rest of the web.”
The best way to start an audit
is with a map of all of the
vendors in your marketing
cloud. From there, you can
determine who owns the
relationship with each vendor
as well as the reason for
working with the vendor.
STEP 1: MARKETING CLOUD MANAGEMENT
STARTS WITH AN AUDIT
Step 1: Determine who works with each vendor and why
Marketing
Web Ops
IT
Legal
Your Site
6. 5
STEP 2: MARKETING AND IT
WORKING TOGETHER
The first thing most companies notice when they perform an audit is that the relationships with vendors in their marketing cloud are dispersed across many groups, both within and outside the company. Most of these relationships ultimately fall under the management of the CMO, so it’s no surprise the CEB estimates that three times as much money is spent on technology innovation outside the IT budget as within.4
Still, data management, targeting, advertising and social media vendors will be dispersed across the media team, agencies, and even multiple brand groups. Just as likely, analytics, video and content vendors might fall to the eCommerce teams or website operations.
There are often several vendors that:
•
Provide overlapping services
•
Have no direct relationship with the company
•
Still access the marketing cloud despite expired contracts
•
Have expired contracts
•
Create data leakage risks
MarketingWeb OpsNon-SecureExpiredContractSlowRedundantExpired ContractWorks withcompetitorToo many indirect callsITLegalYour Site
4 “Executive Guidance, Harness Business-Led IT,” Corporate Executive Board, Q2 2014
Step 2: Assess the value of each vendor
7. 6
The audit should not be used
as an opportunity to blame
departments for poor vendor
management. Rather, the
audit is a chance to create
a fresh start and improve
communication across groups.
It is a great opportunity for
marketing to include the
eCommerce and IT teams in
the marketing technology
decision-making process,
and for all three departments
to share their general
philosophies and determine
a way to meet in the middle.
Some company cultures
deliberately exclude IT
from marketing technology
decisions, considering the
department too risk averse
and slow to keep up with
marketing progress. A recent
Accenture study reflects
this hesitation: “Notably,
CMOs expect much quicker
turnaround and higher quality
from IT, with a greater degree
of flexibility in responding to
market requirements. CMOs
view the CIO organization as
an execution and delivery
arm at a time when they
should consider IT as a
strategic partner and involve
CIOs when planning new
marketing investments.”5
Good marketing cloud
management makes the
marketing/IT collaboration
a reality. The cosmetics
retailer Sephora has a single
executive who serves as both
Chief Marketing Officer and
Chief Digital Officer, because
merging the two teams allows
the brand to make the most
of its investments across
all channels while moving
quickly and efficiently.6
The point of collaboration
is not to simply increase
speed and efficiency. Inter-department
cooperation must
inspire goals that benefit the
bottom line as well. One big
box retailer included members
from IT in the approval
process of all marketing
vendors after it estimated
that the cost of customer data
leakage was higher than the
revenue provided by many of
their partners. By enforcing
a more thorough evaluation
process early in the vendor
relationship, that retailer’s
online business became more
secure and more profitable.
6 “ How Sephora Reorganized to Become a More Digital Brand,” Dan McGinn, Harvard Business Review Blog, 6/26/ 2014
5 “ CMO’S Time for Digital Transformation,” Accenture, 2014
“CMOs view the CIO organization as an execution and
delivery arm at a time when they should consider
IT as a strategic partner and involve CIOs when
planning new marketing investments.” - Accenture
8. 7
Companies ready for a more
rigorous vendor selection
process would do well to
follow the best practices
of Equifax. Equifax uses a
vendor questionnaire to rate
vendors on data management
practices, compliance with
online advertising governance
and relationships with
Equifax’s competitors, among
other things.
Once a vendor is selected,
it is monitored regularly to
ensure continued compliance.
In a recent webinar, Nicole
Keiter, Director of Media
Strategy and Optimization
within Marketing at Equifax,
noted, “We monitor vendor
redirects and data collection
closely. Our vendor
questionnaire, which must be
completed before a company
can be added to our website,
asks a vendor to outline any
tag redirects or data collection
that may occur. We then
make sure this aligns with
our privacy policy. If they are
outside of our guidelines,
then we may flag and say
this will or will not work.”
STEP 3: FORMALIZE VENDOR
SELECTION PROCESS
9. 8
SAMPLE DIGITAL VENDOR QUESTIONNAIRE:
Vendor Name:
Date:
Parent Company
Secure Tax/Pixel Code:
In the box below, please list all code that will need to be placed on (Company)
properties, breaking out each section of code with an appropriate designation as
necessary (ex: <!-- retargeting--> <img src=…>, <!-- conversion--> <img src=…>, etc.).
Purpose of Pixel: __________________________________________________
Pixel Code:
PRIVACY & DATA SECURITY:
1. Is your company a member of the NAI? (Network Advertising Initiative)
(Y/N): _____
2. Is your company a member of the DAA? (Digital Advertising Alliance)
(Y/N): ______
3. Is your company a member of the IAB? (Interactive Advertising Bureau)
(Y/N): _______
4. (Company) does not allow PII collection of its website and web properties. Please
confirm that no PII information will be collected on (Company) web properties:
5. Does the proposed media buy incorporate OBA? (Online Behavioral
Advertising/Behavioral Targeting) (Y/N): _______
If yes, please answer the following questions:
a. If media buy incorporates OBA, do you provide an opt-out option for consumers?
(Y/N): _______
b. Do you apply the Advertising Option Icon (Ad Choices) to all of your OBA-targeted
ads? (Y/N): _______
6. Does the proposed media buy incorporate retargeting and/or data
collection off of any (Company) web property? (Y/N): _______
7. Can you provide secure image pixels? (Y/N):
8. Do you have SSL Certification? (Y/N):
Can you confirm that your SSL Certificates will be active throughout the (Company)
campaign? (Y/N): ______
10. 9
9. Does your pixel redirect or make any additional calls? (Y/N): ______
If yes, please answer the following questions:
a. How many additional calls will your pixel(s) make? _______________
b. Please provide the following information for all additional calls:
HTTP Call Purpose
All redirects or additional calls must be secure.
Vendors will have to notify (Company) about any update that it might make to its pixel.
If the pixel has been altered after it has been placed and (Company) has not been notified of this
change and if (Company) deems it unfit, we will remove this pixel.
10. Does your technology employ the use of any technologies (including but not limited
to Flash local storage objects/“Flash cookies”, Indexed Database API, Web SQL
Database, Google Gears, Web storage or DOM storage) to persist user data after
a user has cleared the HTTP cookies from their web browser? (Y/N): ______
PERFORMANCE AND TECHNOLOGY:
11. Will your pixel work with all browsers (Internet Explorer, Firefox; Chrome, Opera,
Safari etc.)? (Y/N): ______ Yes and No are acceptable answers.
If no, list the browsers on which your pixel doesn’t fire: ___________
________________________________________________
12. Are there server redundancies in place for your pixels? (Y/N): ______
Please explain how this is handled: ____________________________________
13. What is the expected load and response time for your pixels?
14. In the event the pixel does not load or respond, please describe what we can expect
to see: _______________________________________________________
15. Please provide contact information and hours available (please
include name, phone, e-mail address and time zone):
a. Do you have a 24/7 support (contact) for problems relating to pixels?
(Y/N): ______
16. What best practices, if any, does each script use (i.e.: deferral, asyn loading, etc)?
17. What is your average monthly downtime?
18. Do you use a CDN? If so, where are your caches located?
19. Please provide a list of all the pages on which you will place scripts. ___________
________________________________________________________________
11. 10
STEP 4: CREATE A CENTER OF EXCELLENCE
LED BY A TECHNICAL EXPERT
Several early adopters of
marketing cloud management,
including Equifax and IHG,
have designated an individual
stakeholder to lead and
manage the process. The best
candidate is part of the IT
organization, or the Marketing
IT organization. This digital
technologist should be in
charge of a cross-functional
committee, or official center
of excellence, with direct
communication to both
digital marketing leaders
and IT leaders. As one home
improvement retailer put
it, “We made sure our MCM
leader answered to the IT team
and had technical chops, but
was business savvy enough
to act as a true mediator
across departments.”
An empowered center of
excellence operates under
the mandate that it will
“control the marketing
cloud.” This group should
consist of marketers who
need technology on the site,
as well as, analysts, data
governance professionals,
and IT managers who handle
website performance and
security. The group should
have incentives objectively tied
to overall business success,
and not the special interests
of individual departments.
“We made sure our MCM leader answered to the IT team and had
technical chops, but was business savvy enough to act as a true
mediator across departments.” - Head of Digital Marketing and Data
Management Platforms, Fortune 100 Retailer
12. 11
GHOSTERY HAS FOUND THAT A GOOD MCM
CENTER OF EXCELLENCE:
• Is headed by an IT leader who supports digital marketing
• Evaluates and approves all vendors
• Owns vendor contracts
• Monitors all active vendors
• Enforces security and performance best practices with all vendors
• Performs initial and ongoing cost-benefit calculations
• Owns the removal of vendors
• Leads a group of cross-departmental stakeholders
Marketing Cloud Management Leader
Analytics
Data Governance
Legal
IT
Web Ops
Marketing
eCommerce
13. 12
STEP 5: THE FOUR PILLARS OF A GOOD DIGITAL VENDOR
MANAGEMENT PROCESS
While a rigorous vendor
management process is
common in IT organizations,
the discipline hasn’t yet found
its way to digital marketing.
Most vendors are compared
and evaluated by the marketing
team, or the media agency,
simply for their benefits. Very
rarely are vendors penalized
for the hidden costs to the
business – costs that often
outweigh the benefits. Once
implemented, vendors are
only monitored for top-line
marketing performance—not
against SLAs common on the IT
team, or against revenue and
order size metrics common
to the commerce team.
Good digital vendor
management will have
material impacts to the
marketing department, but
it should increase overall
ROI for the company. Martin
Van Der Meij shared that his
team at De Telegraaf has
“removed the presence of
detrimental tags by 76 percent
and improved tag speed by 62
percent, which has created a
better user experience and
more value for advertisers.”
In your vendor management
process you’ll want to focus
on four pillars to keep
everyone aligned for:
• Security
• Performance
• Governance
• Competitive Intelligence
De Telegraaf has “removed the presence of
detrimental tags by 76% and improved tag speed
by 62%.” - Martin Van Der Meij, Head of Revenue
Development, De Telegraaf
14. 13
SECURITY
Non-secure third
party scripts placed
on Hertz.com
7 “Into the Breach: Identity Theft Protection,” Annamaria Andriotis, The Wall Street Journal, 1/24/2014
8 “Content Widget Maker Taboola Is Hacked On Reuters,” Tim Wilson, Dark Reading, 6/24/2014
Your terms and conditions,
as well as most vendor
contracts, contain legal
obligations to keep user data
secure. Keeping your own
assets secure is a business
imperative. According to the
Identity Theft Resource Center,
the number of data breaches
is on the rise. More than 600
known breaches occurred in
the U.S. in 2013.7 There are
several security indicators to
monitor within the marketing
cloud including tracking non-secure
connections occurring
between your vendors and
your secure pages. The
average secure web page
deploys over 35 vendor tags.
If this code were to make
unencrypted calls or otherwise
become compromised, all
of the data transmitted by
the page would be put at
risk. It is also imperative to
monitor any code or script
changes that happen by your
vendors. The recent hack
into Taboola’s widget on
Reuters.com demonstrated
that “websites need to
think long and hard, not
only about the security
of their own servers, but
whether the companies
who are providing widgets
and plugins that power the
websites are taking security
as seriously themselves,”
according to Graham Cluley,
a computer security expert.8
15. 14
PERFORMANCE
Place cost/benefit assessments front and center. Quantifying risks and costs up front
goes a long way toward establishing better vendor management. Mandate that the team
requesting a new vendor relationship present a description of the service the vendor
will provide, as well as a revenue or benefit estimate. Once a vendor is approved, ask
the marketing team to monitor the revenue created by that vendor quarterly.
A good process continually quantifies the following:
1. Does the vendor slow down the website?
2. Is the vendor breaching its SLAs?
3. Is the vendor’s technology working properly (for example, does it always load fully)?
4. Is the vendor limiting the functionality of your website (for example, is it breaking your
video player)?
Determine the path dependency and load times for each of the digital vendors
16. 15
GOVERNANCE
The most important reason for creating a vendor management process is that your enterprise
should own the contract relationship. If a third party controls the contract, you have signed
away the rights to communicate with your own customers. By implementing a vendor
management process, you are also setting the guidelines for vendor monitoring and removal,
further empowering your center of excellence to maintain marketing cloud standards.
Several elements to mandate in your contract are:
1. Business ownership: Basic governance can only occur if problems can be solved. The MCM
leader in your organization should know precisely whom to call — both inside and outside
the company — when a vendor issue arrises. For example, if your Website Operations
Manager and its agency counterpart both have responsibility for your Tag Manager, you
should have contact information for both of them, as well as for the vendor account manager.
2. White lists and black lists: One of the easiest ways to know if you’re working with a new
vendor is to create a living white list of approved vendors that is shared across the company.
Similarly, if a vendor has been rejected from your site, placing them on a black list ensures
they stay away. Implementing a real-time alert mechanism that is shared across the
company and with partners — such as the tag manager and ad agency — is essential.
17. 16
GOVERNANCE
PointRoll
PointRoll
DoubleVerify
InsightExpress
Turn
Global Adsense
Experian Marketing Services
Sizmek
Voice Five
Double Click
ScoreCard Research Beacon
Ghostery Privacy Notice
3. Child tag limits: Several companies put strict
limits on the number of additional vendors a tag
can call from their website. This restricts the flow
of customer data away from the website, reducing
latency and security issues.
4. Data collection and resale restrictions: Many
vendors, especially advertising agency trading
desks and retargeters, use standard contract
language that gives the vendor, not their clients,
ownership over customers. In a vacuum, vendors
will assume control, to the point that they own
your customer — not you. Unless it is in your
contract that they cannot resell your data, assume
that they are doing just that.
This illustrates the child tag relationship across digital
vendors, and how they were brought on to a site
18. 17
COMPETITIVE INTELLIGENCE
Marketing cloud management
starts with an audit, but it
doesn’t end with one. Vendors
change; they bring in new
partners, stop working,
work more slowly after a
code change, or change their
data management practices
overnight. You must be
monitoring their performance
against competitors’ sites to
understand the scope of these
changes. For example, if they
are causing site latency on
your website, is it isolated or
web-wide? Additionally, if you
start working with a vendor
who has few retail customers,
competitive data leakage is
not a large risk. But over time,
the vendor might add new
retail customers, increasing
the risk considerably, and
putting the overall cost-benefit
into question.
Company A
Page Latency
Company B Company C Company D
900 ms
800 ms
700 ms
600 ms
500 ms
400 ms
300 ms
200 ms
100 ms
0 ms
Aug 10 Aug 11 Aug 12 Aug 13 Aug 14 Aug 15 Aug 16
Benchmark your company’s website performance against others in the industry
19. 18
CONCLUSION
Marketing cloud management is a growing discipline. If you
are like the MCM champion at most enterprises, you are just
beginning to understand the costs associated with the vendors
in the marketing cloud. Whether you work with Ghostery
Enterprise, with another provider, or develop the process
in-house, the key to success is considering the costs and
benefits to the whole business before allowing any marketing
vendor access to your website or customer data. The only way
to achieve this kind of balanced analysis is to work across
departments. The sooner teams can objectively work together
to better manage their marketing cloud, the sooner revenues,
market share and profits will grow.
20. 19
Ghostery is a technology company that empowers consumers and
businesses expose and eliminate the digital blindspots in the Marketing
Cloud - the collection of digital technologies that power, measure,
socialize, and optimize performance. Over 40 million people globally rely
on the free Ghostery browser extension to see and control the tracking
technologies that follow them across the web. Businesses rely on Ghostery
Marketing Cloud Management to drive ROI by maximizing the security,
performance, and profitability of their digital assets. Key clients like
Equifax, Intercontinental Hotels Group and Procter & Gamble depend on
Ghostery to take their digital business from chaos to control. Ghostery also
is the leading global provider of privacy governance services, powering
compliance for more than $2 billion of advertising and e-commerce
transactions annually. Founded in 2009, Ghostery is headquartered in
New York City with a technology office in Salt Lake City and sales offices in
London and San Francisco. The company is backed by Warburg Pincus LLC,
the global private equity fund.
ghosteryenterprise.com
sales@ghostery.com
/ghosteryinc
@ghosteryinc
/ghosteryinc
10 East 39th Street, 8th Floor, New York, NY 10016 Ι 917.262.2530
ABOUT GHOSTERY ENTERPRISE