Tuesday, September 23, 2014

A new study links Ghostery digital marketing technology gaps distributed cloud-based security

Source: Company Ghostery

Ghostery company

Ghostery management cloud marketing platform introduces new security module to reduce safety risks and to improve the user experience

NEW YORK, NY - (Marketwire Wired - 23 September 2014) - Ghostery has identified today a new study, the industry hidden security risks for the rapid growth of technology linked in the digital marketing. To help companies manage these online safety risks and maximize the return on their marketing investments, Ghostery also announced a new security module for its cloud management solution (MCM) Marketing.

The results of the study of industrial Ghostery "Digital Security is a serious matter", not today published the most popular sites for all key sectors of the industry including retail, banking, insurance, publishing and aviation technology in the areas of marketing safe security of their websites. 1

The complexity of the "Cloud Marketing" of each company - the collection of digital technologies, the energy measurement socialize, and optimize digital marketing - creates significant blind spots that affect the ease of use and reduce the revenue of the company. This study illustrates the importance of issues related to the safety of these blind spots are available: presence of warnings (also called "mixed content warnings" known) that have shaken consumer confidence in the brand, 2 increased exposure to man the middle - in-the-browser attacks, 3 and a negative effect on search engine rankings on Google.

The "Digital Security is a serious matter" study based on real data from the user interaction Ghost Rank community of 20 million members in 50 main pages.

"Make sure the company more transparency portal improves the user experience and increases the online overall security of the Internet," said Devdatta Akhawe, Ph.D., author of the report and co-author of "Alice in Warning state. Powerful study of browser security warning effectiveness "" Without effective security measures, web pages up to 65 percent of the visitors to lose by a bad user experience. "

"Digital Security is a serious problem:" The results of the study:

  • 96 percent of the sites surveyed Cloud Marketing related security blind spots. Sides of the Finance, Sales and air transport are the most vulnerable because of unsafe code on secure pages.
  • Shopping websites have the highest volume of vulnerabilities with 438 different digital marketing technologies without warranty are investigated in the top 10 retail sites. A website selling more than 300 blank technologies used in secure web pages.
  • Despite strong security investments financial services and insurance are widely exposed to unsafe technology risk enterprise cloud marketing. 100 percent of the insurance companies and 90 percent of the sites online banking sites have used the case of cloud computing technologies Marketing examines unsecured secure pages.

Today's news comes on the heels of the recent announcement by Google that a secure Web pages for better search rankings, increased impact and safety online website visits and sales of the company. 4

Ghostery company announced a new security solution:
Enable organizations to take control of this serious situation, today announced the launch of its new Ghostery Ghostery security module MCM, a first in the industry. This new solution leverages the community of 20 million real users Ghost Rank to identify in real time when the marketing technology of uncertainty undermines the integrity of the secure pages. Security Ghostery MCM triggers alarms to detect security flaws before they harm a significant impact on the enterprise revenue due to the usability of the site and Google search rankings pressed.

Ghostery MCM module security is part of their marketing Cloud Management (MCM) and the platform will be available 17th October 2014 The new security module is based on the other MCM Ghostery - Performance-latency / control, data governance and privacy. Large companies rely on Ghostery MCM to eliminate blind spots your digital ROI and increase their online marketing investments.

"The security Ghostery shows what many Chief Information Officers (CIOs) and practitioners of information security were known but not quantified in the situation - that security breaches do more than just user to expose danger, chopped," CEO Scott Meyer Ghostery said. "These defects directly on the user experience and the company's sales. Our study shows that the rapid growth of technology and marketing problems clouds unsecured technology are much more widespread than previously thought. Provider not only is guilty of this security issue. Rather, the company must to take control of their cloud marketing and to ensure that your investment in technology to work for them. "

Examine the risks hidden vulnerabilities in any cloud marketing site, Ghostery can identify risks, reduce vulnerability and drive significant revenue increases. How CIOs and Directors of Marketing (CMO) work together to take advantage of the promise of digital marketing, more control over security is essential to maximize the benefits of cloud marketing investments.

For more information on Cloud Marketing Management Ghostery, please visit http://www.ghosteryenterprise.com. To download a complete "digital safety is a serious matter" Ghostery report, please click here.

About Ghostery
Ghostery can consumers and businesses to expose and eliminate blind spots in the Cloud Digital Marketing - collection of digital technologies, the energy measurement to socialize, and to optimize web pages and applications. More than 40 million people around the world use the free Ghostery browser extension to view and control their followers online technologies. Companies rely on cloud management Ghostery Marketing ROI go through the maximization of safety, performance and profitability of their digital assets. Major customers such as Equifax, InterContinental Hotels Group and Procter & Gamble from Ghostery your business taxes on digital chaos. Ghostery is also the leading provider of Governance privacy worldwide, advance the implementation of the measures of more than 2 billion annually advertising and e-commerce. Founded in 2009, Ghostery is a technology office in Salt Lake City and sales offices in London and San Francisco based in New York. The company is supported by Warburg Pincus LLC, a global private equity investment. More GhosteryEnterprise.com etghosteryinc.

1 Source: Wikipedia: http://en.wikipedia.org/wiki/HTTP_Secure. "Say sides, the use of" "In his popular internet provision," secure HTTPS. "This allows the authentication server and the website with the contact that protects man-in-the -Middle against attacks connected. Additionally, it provides an encryption Two-way communication between client and server, the network against eavesdropping and manipulation and / or form the content of the communication protects. [4] In practice this with reasonable certainty we communicate exactly the site intends to communicate with (as opposed to a fraudster) "and make sure that the content of the communication between you and the website can not read or manipulated by a third.

2 Definition of mixed content and the associated risks:
http://www.troyhunt.com/2013/06/understanding content.html joint venture;
https://community.qualys.com/blogs/securitylabs/2014/03/19/https-mixed-content-still-the-easiest-way-to-break-ssl

Http://www.veracode.com/security/man-middle attack: 3 Source A man-in-the-middle attack is a type of cyber attack, where a malicious agent adds him / her in conversation between two and embodies both the access to information that both parties have tried to send another. An attack Man-in-the-middle can intercept a malicious agent to send, and data to someone else, or not sent at all was, without the parties had to know, "it's too late. Man-in-the- middle attacks can in many ways, including, MITM, MITM, MiM or MIM be abbreviated.

4 http://www.zdnet.com/google-confirme-son-donnant-https-sites-supérieur-recherche-classement-7000032428/

No comments:

Post a Comment