Best Practices for Effective Campaign Management 1.

Slides:



Advertisements
Similar presentations
1 NameMatrix Number Francis YeeHT036029M George Goh Alex LimHT052467E Hoe Swee SimHT052560I Vijay.
Advertisements

Reducing Risk and Improving Profitability Jay Wommack CEO.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Cingular Case Studies September 24, © 2007 BearingPoint, Inc.IM – Content, Portals and IntegrationCommunications and Utilities AT&T B2B Wireless.
This material is the property of GlobalSolve  Management Services and is not authorized for reproduction or distribution without the prior written approval.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Electronic Transaction Security (E-Commerce)
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
1 Integrating ISA Server and Exchange Server. 2 How works.
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
Website Hardening HUIT IT Security | Sep
Buy Local. A Community Partnership Program. What is Buy Local? Wicked Local has launched a grass rots community partnership program called Buy Local.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Road to the Cloud The Economics of Cloud Computing.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Lecture 5 Title: Networks and Businesses
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Marketing of Information Security Products. The business case for Information Security Management.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Presentation by Clare Drew – Goss Interactive Steve Thomson – All Wales Unit.
WEB ANALYTICS ECOMMERCE SOCIAL MEDIA SEARCH ENGINE OPTIMIZATIO PAY PER CLICK MANAGEMENT EFFECTIVE WEBSITE COPY.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
SECURITY ENGINEERING 2 April 2013 William W. McMillan.
Akamai Technologies - Overview RSA ® Conference 2013.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
RJB Technical Consulting Microsoft Office SharePoint Server 2007 Deployment – Do’s and Don’ts Russ Basiura.
1 AUTOTRADER.COM “OVERDRIVE” COLLABORATING FOR SUCCESS JOSH SEARCY SENIOR MANAGER, DISPLAY ADVERTISING PRODUCTS, AUTOTRADER.COM. JEN SCHREIBER DIRECTOR,
ACM 511 Introduction to Computer Networks. Computer Networks.
Website s Azure Websites is an enterprise class cloud solution for developing, testing and running web apps. Azure Websites allows you to focus on what.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Providing Exclusive Services: Business Oriented Document Management Solution for Enterprise Alexander Mitrovich, Director Corporate Clients Nikolay Priezhiy.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
All rights reserved | Phone: | Website: © 2004 Accenture All Rights Reserved.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Forefront Security “Drilling down...” Dr Gopal Kutwaroo UK Forefront Security.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Employee Orientation to ISO Sygnetics, Inc. is committed to quality. ‘Quality’ is the ability to consistently produce a product or service that.
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Accelerate Mobile App Delivery with Kinvey on vCloud Air.
Managed IT Services JND Consulting Group LLC
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Cloud Computing Market Size Statistics, Global Size, Share, Analysis.
Chapter 5 – E-commerce and Enterprise Systems
Understanding The Cloud
5 Strategies to Win Business and Stay Competitive
INTRODUCTION CNA Recap:
Presented By: OWNER NAME
Website Redesign Presented BY: Lauren Hendricks Moriah Richards
Strong Security for Your Weak Link:
INTRODUCTION We are perfectly formed creative Software Consulting Company based in USA & India. We have been making pretty things since Feb.
12/8/ :07 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Presentation transcript:

Best Practices for Effective Campaign Management 1

2 Tenzing designs, deploys and fully manages IT infrastructure for organizations running mission-critical Ecommerce, SaaS, and Enterprise Web applications. We work collaboratively with customers to achieve their goals through our award-winning approach to IT service management and a comprehensive portfolio of services. Company Highlights Founded in 1998, privately owned 450 customers (15% in the US and abroad) Tenzing clients power some of the world’s most recognizable brands Certifications: SSAE16, ISO 27001, PCI compliant Variety of dedicated, Cloud and Private Cloud environments Consistent double digit growth: last 5 years 80 employees (75% dedicated to service delivery) Corporate Overview

Coca Cola, February 3, 2013 Average page load time of 62 seconds

Ghosts of Christmases Past

5 47% of consumers expect a website to load in 2 seconds or less. 40% will abandon a website that takes more the 3 seconds to load. A 1 second delay (or 3 seconds of waiting) decreases customer satisfaction by 16%. 79% of shoppers who are dissatisfied with website performance are less likely to buy from the same site again. 44% of online shoppers will tell their friends about a bad experience online

6 Agenda Security Preparedness Campaign Management & Forecasting Performance Testing Change Management

7 Data and Infrastructure Security Patch your Servers (or approve your vendor to patch them) Ensure ports on your servers are not open unnecessarily Limit Access to your environment Dedicated usernames and passwords Review your user list regularly Rotate passwords regularly Implement a Strong Password Policy

Denial of Service Attacks Understand your Infrastructure Provider’s DoS response policy Invest in a DoS Mitigation Service Always On Pre-staged Test your Incident Response Plan

Campaigns Treat all campaigns like an application launch Segment your campaign into blocks Limit us of media Communicate to stakeholders Develop an Incident Response Plan to address problems and monitor your campaign closely

Promotional and Discount Codes Do not use new discount structures during your peak periods Test all discount codes before use When testing: Regression testing (test combinations of codes) Develop test cases which satisfy and break the discount rules End User Testing Keep a code library of discount codes Who can use them When On What

Capacity Assessments Start by projecting traffic Be aware of all Single Points of Failure Review current performance/capacity across your infrastructure Understand your Infrastructure Provider’s ability to add capacity

Load Testing Complete a Load Test after major changes to your application and prior to peak periods Identify Test Scenarios Communicate Testing to your infrastructure provider and Third party vendors

Stop Making Changes Establish a cut off to make non-emergency changes, be disciplined Communicate your freeze dates to all Stakeholders Understand your Vendors’ Change Policies