Q&A with Olivia (Ross) Taylor, Director of CRO at Directive Consulting

Olivia Taylor, Director of CRO at Directive Consulting has 10 years of working experience in graphic designing and has expert knowledge in CRO/UX in landing pages and websites designing.

Olivia was recently nominated for the Orange County Business Journal's Top 25 Women in Business Awards.

MEDIA 7: What’s your superpower?
OLIVIA TAYLOR: I would like to think my superpower is empathy. That’s part of what CRO is: figuring out and understanding what’s going on through people’s minds and finding out what people need and want.

M7: Does it point to user intent, a term generally used in Account Based Marketing?
OT: 
Yes, exactly that. Because I’m able to basically understand where the consumer and the buyer is coming from, I can better optimize my clients’ websites, change that language in the headline and the subhead to relate to the customers’ pain points and better describe the benefits of what my client can provide to them.

M7: Your career spans an impressive 8 years from a Graphic Designer to being a Director of CRO at Directive Consulting. What attracted you to this industry, and how does Directive Consulting fit into your story?
OT:
I became a designer because all other subjects in school were boring. 2+2 will always be 4, but with design, there are so many possibilities - so many different solutions to a problem. Plus, I always loved drawing and creating.
While going to school, I worked as a designer at a few different places. Then upon graduating, I worked at a tech company in-house but it just wasn’t for me. I moved on to an agency that was full-service, but that also was not the right fit. After that job, I ended up at a PPC agency where I learned about CRO. I started there as just a designer and left there as the Director of CRO.

Using the skills I learned there, I was able to join the upstanding company that is Directive where I’m learning so much more, and doing so many more awesome things than I did at any other job and it has been amazing. It’s so wonderful to work at a place that is professional and that takes the work so seriously, only striving to be the best at being different. 


"The best way we can convince the customers is that we need to address what our client does, that no other competitor can do."

M7: Could you tell us about your best practices for creating an ideal customer experience?
OT: 
A functioning website that loads quickly
Easy navigation and user experience
Clear offerings and clear unique value propositions (what is it that you do that no competitor does?)
Great social proof (testimonials and case studies from current clients, awards, etc)

Great customer service: prompt support, regular email check-ins to see how your customer is doing, offer deals and promotions - all of these things keep a customer coming back for more.

M7: While creating a unique value proposition, how do you drive in the utility? In other words, how do you convince the customer about the uniqueness of your service?
OT: 
We definitely have to utilize this through the headline and anywhere in the hero section of the landing page or the homepage because that’s where people are landing first and you need to be able to grab their attention in the first five seconds. So, the best way we can convince the customers, is that we need to address what our client does, that no other competitor can do.

If you can say we’re the only platform that does x, y, and z, that is a great unique selling point. Another thing to consider is backing up your clients with data. If you are offering some sort of platform that will save me time on the implementation of a process, then tell me how much time I’m going to save. If you say, “Cut down your execution time by 90% with our platform” that’s a unique value proposition. That shows the benefit to the user there, and that will entice users to click through and complete the form. So, gaining conversions is usually based around giving real data that explains exactly what value the visitors are going to see or how much money is going to be made or saved, and how much time is going to be saved to solve a problem with this solution. The other side of the coin is “we are the only ones that do x y z” and that will basically set a business apart from their competitors.

M7: How does collaboration and communication come into play in your role?
OT: 
It’s the entire job. I oversee a design team and I need to make sure my team is not only communicating with me but communicating with other departments. PPC, SEO, and CRO must all work together to get the job done and we’re stronger together than apart. I have daily follow-ups on different accounts, weekly meetings, client sync ups - whatever it takes to make sure that I and the rest of the team have complete transparency into what is happening with these accounts so that we can assist in whatever way we can. We want our specialists and account managers to own their strategy, but the directors are responsible for approving the strategy and improving it if needed.


"As designers, we need to remember that form follows function, so we must be sure that this information is easily accessible, that the message is clear."

M7: What are the biggest mistakes you see businesses making when attempting to optimize their site to increase conversions?
OT:
These companies spend tens of thousands of dollars on a rebrand which will be done by a branding agency that has no knowledge of designing a site for increased conversions. Too many times we’ve had clients come in that just had a rebrand done and their conversions plummeted. So we will go in and audit the site to find out what is causing the problem. Too often, design takes over function but we must always remember that form follows function. As an example, the white space in the new site may be beautiful, but none of your visitors can even see what you’re offering until they get halfway down the page. Things like this are the biggest issues we see.

Also, with too many changes implemented at once, it makes it harder to pinpoint what caused the drop in conversions. It’s often times all of the things combined together that caused the problem. If a company is going to focus on increasing conversions, the changes need to be based on data and not on whims or best practices. Data doesn’t lie.

M7: What is the most challenging part of doing a conversion optimization project? What type of resource commitment do you require from your team?
OT:
The most challenging part is that the results cannot be guaranteed. Our tests are based on data but they’re just that: a test, a hypothesis. Nothing is written in stone. 9 out of 10 times I will be right in my hypothesis, but there will always be a test that fails. We still celebrate the failure because we still learn from it. We can find out why the test didn’t work and use it to narrow down on what will work.

As far as resources are concerned, we want to make sure that we’re testing at least a few things each week per client. We use Hotjar for qualitative research as well as Google Optimize for on-page testing, and Instapage/Unbounce for landing page testing. Reporting is a big part of our deliverable so a good amount of our time is spent gathering the data and providing insights to the client.

M7: According to you, what prompts a visitor to scroll down to the bottom of a webpage?
OT: 
Usually you would have to have a message that entices them in the hero section of the landing page. Just like we discussed about the UVPs, we need to show the customer right when they land on the page, that this is the solution for your problem. That will entice them to scroll down. You can sometimes kind of coax people to scroll down: I like to use false CTAs to get more information and if they click that CTA, it will scroll down to the benefit section on the page and that will get people to start scrolling. And from that benefit section you could have a CTA linking to the case studies on the landing page and get them to scroll down even further on the page.

The main issue is people think of redesigning their page to look better and they see horrible conversions because it may be beautiful but it’s not functional. The messaging is vague and does not relate to what it is they do as a company that’s better than anybody else. They don’t adjust the benefits, and they’re too stuck on this flowery and technical language that a lot of SaaS companies like to use. So, the biggest thing is being very upfront with what you do in layman’s terms, making it as clear as possible to the lowest common denominator, so that you have a potentially larger pool of leads versus only having that technical jargon that only a few may understand. This usually relates a lot to B2B and SaaS clients. They get really hung up on their own language that’s very technical but the common man that needs their service doesn’t understand that...just tell them what the benefit is.

So, to summarize that long rant: basically, make sure that the messaging is clear about the benefits right away, then use CTAs on your page to entice people to keep scrolling so they continue to learn more. Keep people engaged and reading, section by section.


"Gaining conversions is based around giving real data that explains what value the visitors are going to see or how much money is going to be made or saved, and how much time is going to be saved."

M7: In a world where anyone can start a web-based business, generating trust is more important than ever before. Considering this, what impact does design have on revenue?
OT: 
It has a huge impact. If you land on a site that is poorly designed - it’s ugly, it’s confusing, you have no idea what they sell - do you think you would stay on that site for long? No, you’d go to a site that has a clear hero image showing the product and how it works, and a headline that explains what sets it apart from any other competitor product. The way information is presented is just as important as what information is being said.




One-size-doesn’t-fit-all and I’ve seen pages that - funny enough - looked horrible but converted better than the redesign we did, just because the form was more readily available. All the information was above the fold and it looked really scrunched. However, the customers got whatever they needed right away and that was what was important. So even when you’re seeing this image of bad vs good, we could argue that maybe the option on the right still won’t convert because it’s not quite explaining any unique value composition. It has a lot of beautiful imagery but it’s not getting to the point. Although these full-width websites with huge images is the trend, I think it needs to be taken with a grain of salt and used sparingly; and it needs to be dialed back a bit when it comes to conversions. You have these big beautiful images and people have to scroll very far just to get down to the first paragraph which is not good for conversions even though it’s trendy. As designers, we need to remember that form follows function, so we must be sure that this information is easily accessible, that the message is clear and if it is, then great! The beauty comes after that, but messaging has to be clear, concise, and easily understood.

M7: Directive Consulting ranks #1 on Google for “SEO Agency”. What SEO strategies and tools does the company leverage to channelize its sales campaigns?
OT: 
On page SEO and targeted guest posting with keyword driven anchor text. Then we continually write content around SEO and internally link back to our core SEO page.

M7: As a child what did you want to be when you grew up?
OT:
I wanted to be a speleologist (a cave scientist) for years. I was obsessed with caves, stalactites, and stalagmites. I’ve always been interested in maths and sciences, but there are dangers tied to being a cave scientist so I gave up on that. I still sometimes wonder what would have been if I had gone into the sciences instead of design. Maybe I’ll try it out in a few years!

M7: That sounds interesting! Have you visited caves in your earlier days?
OT: Yes, I did visit just a few caves, nothing big like the Man of the cave or Carlsbad cavern but as a child I was very interested in science – Biology, Zoology, Geology just the world around me and caves are interesting because they’re the dark places that not many people go to. I love history, I love biology so I think caves are kind of that interesting combination of both cause they’re ancient and they have these creatures that are so bizarre you know, like these blind salamanders which is like a different world there. I got very fixated on that for a few years as a child, reading all the books I could about it. I had my mind set, this is what I was going to do and I didn’t take into account the dangers of being a cave scientist. You’ll have to get into tight little spaces and there could be cavemen, you could get lost and stuck. Me being a homebody and kind of a bookworm, I decided, you know, maybe this is not the path for me, but I was also an artistic child. I was drawing all the time and that’s how I ended up in design school instead. So a very different path, but I still love science and history so I might dabble in it later in my life but for now it’s been design.

ABOUT DIRECTIVE CONSULTING

Directive does beautiful search marketing for B2B and enterprise companies that share our values. We redefine the global standard for how marketers work, live, and grow. We are a group of SEO, PPC, and content experts who are passionate about working with the best B2B brands in the world. When we are not executing ROI driven campaigns, you can find us drinking cold brew, volunteering in our community, or playing an intense game of ping-pong.

More C-Suite on deck

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

Related News

End Point Protection

Malwarebytes Unveils New K-12 ThreatDown Bundle to Defend Schools and Districts from Cyberattacks

Malwarebytes | January 24, 2024

Malwarebytes, a global leader in real-time cyber protection, today announced the availability of ThreatDown K-12 Bundle, combining the cybersecurity technologies and services that K-12 education institutions need into a streamlined, cost-effective bundle. Purpose-built to reduce risk, complexity and costs for districts and schools, the ThreatDown K-12 Bundle delivers unified protection with an intuitive, easy-to-manage design. The ThreatDown K-12 Bundle allows schools to optimize device uptime and improve productivity, while protecting students and staff, devices and data from the latest cyber threats. "Schools are increasingly facing cyber threats with limited IT resources, leading to a rise in ransomware attacks that affect staff, teaching, and student well-being," said Marcin Kleczynski, Founder and CEO of Malwarebytes. "Historically, cost barriers prevented schools from adopting cybersecurity managed services. Our K-12 Bundle packages together everything districts need to reduce risk and comply with regulations within a manageable budget. We're committed to making powerful protection and managed services accessible to vulnerable schools and students." Bridging the Cybersecurity Gap for Resource-constrained K-12 IT Teams Modern K-12 educational institutions have a wide range of school-, staff- and student-owned devices – from traditional laptops, desktops and servers to Chromebooks, iPadOS, iOS, and Android devices. While these devices greatly enrich the student learning experience and streamline operations for staff, they also introduce new risks. Key features of the ThreatDown K-12 Bundle include: Award-winning endpoint security: K-12 Bundle is built on ThreatDown's strongest AI/ML-driven prevention, detection and response technologies fortified by built-in innovations to reduce the attack surface. These technologies simplify the process of finding and patching software vulnerabilities and prevent unauthorized programs from executing. 24x7x365 managed services: The K-12 Bundle combines ThreatDown advanced technologies with Managed Detection and Response (MDR) service of ThreatDown cybersecurity experts to manage security and resolve alerts around the clock, delivered as an affordable, hassle-free bundle. Unified endpoint management: ThreatDown extends powerful endpoint protection across workstations, servers and mobile device to substantially strengthen schools' cybersecurity postures in compliance with new and pending regulations. Quick and easy to deploy, the K-12 Bundle saves time and resources with unified endpoint management for both traditional and mobile devices – all from a single, cloud-native console. Centralized, real-time visibility: K-12 IT teams can easily view activity across all devices in real time. With a unified platform and visibility for traditional and mobile endpoints, teams can monitor and protect devices from a single pane of glass. Teams can understand the threats to devices in their environments and mitigate potential risks. Advanced mobile protection: ThreatDown K-12 Bundle provides effective protection for Chromebooks, iPadOS, iOS, and Android devices, guarding against the latest mobile threats such as ransomware, malicious apps, and potentially unwanted programs (PUPs). With real-time protection, schools can also prevent accidental access to harmful websites, safeguard against malicious apps, block unwanted in-app ads, and enable a secure mobile experience for students. About Malwarebytes Malwarebytes is a global cybersecurity leader delivering award-winning endpoint protection, privacy and threat prevention solutions worldwide. Built on decades of experience as the last resort to find and eradicate the latest malware, Malwarebytes is now trusted by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. A world class team of threat researchers and proprietary AI-powered engines provide unmatched threat intelligence to detect and prevent known and unknown threats. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

API Security

Cequence and Vercara Partner to Combat Cyber Threats and Revolutionize API Security

Cequence Security | January 25, 2024

Cequence Security is proud to announce a new partnership with Vercara, a leading provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protections with Cequence Security's innovative Unified API Protection (UAP) platform. Security teams encounter substantial hurdles in safeguarding API applications from cyber-attacks, including the rapid development and deployment of API applications across diverse cloud providers. The unmanaged and unprotected nature of these APIs can harbor critical vulnerabilities, making them susceptible to exploitation. Moreover, the lack of a clear and consistent security posture across the application footprint introduces further complexities. To address these challenges, Cequence Security's UAP platform provides a comprehensive discovery of the entire API attack surface, encompassing both external and internal APIs. It ensures compliance with security and governance best practices, eliminating unknown and unmitigated API security risks. Furthermore, the solution offers native real-time inline protection, blocking API attacks before they reach applications. "The absence of API protection puts you at risk of potential theft, fraud, non-compliance, and business disruptions,” said Carlos Morales, SVP Solutions at Vercara. “Our partnership with Cequence combines our collective best-in-class services to address the evolving demands of the cybersecurity landscape, ensuring that businesses can confidently deploy needed applications and successfully navigate the complexities of API security with advanced, holistic protection.” Arun Gowda, VP, Business Development at Cequence Security, said, “In the evolving landscape of cybersecurity, the extensive risk of data compromise in API breaches goes beyond external APIs to internal ones. These often-overlooked internal APIs can access sensitive data not intended for public exposure. APIs have changed the game for attackers, making it imperative to prioritize the security of all assets accessible through APIs, including those not expected to be publicly exposed.” He added, “We are pleased to combine our innovative API security solutions with Vercara's innovative WAF and DDoS services to deliver advanced, holistic API protection. This collaboration reinforces our commitment to provide unparalleled security measures for businesses reliant on APIs.” Cequence Security's UAP platform is unparalleled in addressing all phases of the API security lifecycle. It provides: Discovery: A continuous API attack surface discovery management product that assesses your application footprint, offering a complete inventory of external APIs. Compliance: A security posture management product that identifies security risks in APIs, ensuring compliance with specifications, security test requirements, and governance best practices. Protection: Detects and prevents sophisticated automated API attacks and business logic abuse using advanced machine learning rules, providing real-time protection without relying on third-party components. About Cequence Security Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection across all internal and external APIs to defend against attacks, targeted abuse, and fraud. Requiring less than 15 minutes to onboard an API without requiring any instrumentation, SDK, or JavaScript integration, the flexible deployment model supports SaaS, on-premises, and hybrid installations. Cequence solutions scale to handle the most demanding Fortune and Global 2000 organizations, securing more than 8 billion daily API calls and protecting more than 3 billion user accounts across these customers. To learn more, visit www.cequence.ai. About Vercara Vercara is a purpose-built, global, cloud-based security platform that provides layers of protection to safeguard businesses’ online presence, no matter where attacks originate or where they are aimed. Delivering the industry’s highest-performing solutions and supported by unparalleled 24/7 human expertise and hands-on guidance, top global brands depend on Vercara to protect their networks and applications against threats and downtime. Vercara’s suite of cloud-based services is secure, reliable, and available, delivering peace of mind and ensuring that businesses and their customers experience exceptional interactions all day, every day. Pressure-tested in the world’s most tightly regulated and high-traffic verticals, Vercara’s mission-critical security portfolio provides best-in-class DNS and application and network security (including DDoS and WAF) services to its Global 5000 customers and beyond. For more information, visit vercara.com.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

End Point Protection

Malwarebytes Unveils New K-12 ThreatDown Bundle to Defend Schools and Districts from Cyberattacks

Malwarebytes | January 24, 2024

Malwarebytes, a global leader in real-time cyber protection, today announced the availability of ThreatDown K-12 Bundle, combining the cybersecurity technologies and services that K-12 education institutions need into a streamlined, cost-effective bundle. Purpose-built to reduce risk, complexity and costs for districts and schools, the ThreatDown K-12 Bundle delivers unified protection with an intuitive, easy-to-manage design. The ThreatDown K-12 Bundle allows schools to optimize device uptime and improve productivity, while protecting students and staff, devices and data from the latest cyber threats. "Schools are increasingly facing cyber threats with limited IT resources, leading to a rise in ransomware attacks that affect staff, teaching, and student well-being," said Marcin Kleczynski, Founder and CEO of Malwarebytes. "Historically, cost barriers prevented schools from adopting cybersecurity managed services. Our K-12 Bundle packages together everything districts need to reduce risk and comply with regulations within a manageable budget. We're committed to making powerful protection and managed services accessible to vulnerable schools and students." Bridging the Cybersecurity Gap for Resource-constrained K-12 IT Teams Modern K-12 educational institutions have a wide range of school-, staff- and student-owned devices – from traditional laptops, desktops and servers to Chromebooks, iPadOS, iOS, and Android devices. While these devices greatly enrich the student learning experience and streamline operations for staff, they also introduce new risks. Key features of the ThreatDown K-12 Bundle include: Award-winning endpoint security: K-12 Bundle is built on ThreatDown's strongest AI/ML-driven prevention, detection and response technologies fortified by built-in innovations to reduce the attack surface. These technologies simplify the process of finding and patching software vulnerabilities and prevent unauthorized programs from executing. 24x7x365 managed services: The K-12 Bundle combines ThreatDown advanced technologies with Managed Detection and Response (MDR) service of ThreatDown cybersecurity experts to manage security and resolve alerts around the clock, delivered as an affordable, hassle-free bundle. Unified endpoint management: ThreatDown extends powerful endpoint protection across workstations, servers and mobile device to substantially strengthen schools' cybersecurity postures in compliance with new and pending regulations. Quick and easy to deploy, the K-12 Bundle saves time and resources with unified endpoint management for both traditional and mobile devices – all from a single, cloud-native console. Centralized, real-time visibility: K-12 IT teams can easily view activity across all devices in real time. With a unified platform and visibility for traditional and mobile endpoints, teams can monitor and protect devices from a single pane of glass. Teams can understand the threats to devices in their environments and mitigate potential risks. Advanced mobile protection: ThreatDown K-12 Bundle provides effective protection for Chromebooks, iPadOS, iOS, and Android devices, guarding against the latest mobile threats such as ransomware, malicious apps, and potentially unwanted programs (PUPs). With real-time protection, schools can also prevent accidental access to harmful websites, safeguard against malicious apps, block unwanted in-app ads, and enable a secure mobile experience for students. About Malwarebytes Malwarebytes is a global cybersecurity leader delivering award-winning endpoint protection, privacy and threat prevention solutions worldwide. Built on decades of experience as the last resort to find and eradicate the latest malware, Malwarebytes is now trusted by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. A world class team of threat researchers and proprietary AI-powered engines provide unmatched threat intelligence to detect and prevent known and unknown threats. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

API Security

Cequence and Vercara Partner to Combat Cyber Threats and Revolutionize API Security

Cequence Security | January 25, 2024

Cequence Security is proud to announce a new partnership with Vercara, a leading provider of cloud-based services that secure the online experience. This collaboration aims to fortify the cybersecurity landscape by pairing Vercara’s network and application protections with Cequence Security's innovative Unified API Protection (UAP) platform. Security teams encounter substantial hurdles in safeguarding API applications from cyber-attacks, including the rapid development and deployment of API applications across diverse cloud providers. The unmanaged and unprotected nature of these APIs can harbor critical vulnerabilities, making them susceptible to exploitation. Moreover, the lack of a clear and consistent security posture across the application footprint introduces further complexities. To address these challenges, Cequence Security's UAP platform provides a comprehensive discovery of the entire API attack surface, encompassing both external and internal APIs. It ensures compliance with security and governance best practices, eliminating unknown and unmitigated API security risks. Furthermore, the solution offers native real-time inline protection, blocking API attacks before they reach applications. "The absence of API protection puts you at risk of potential theft, fraud, non-compliance, and business disruptions,” said Carlos Morales, SVP Solutions at Vercara. “Our partnership with Cequence combines our collective best-in-class services to address the evolving demands of the cybersecurity landscape, ensuring that businesses can confidently deploy needed applications and successfully navigate the complexities of API security with advanced, holistic protection.” Arun Gowda, VP, Business Development at Cequence Security, said, “In the evolving landscape of cybersecurity, the extensive risk of data compromise in API breaches goes beyond external APIs to internal ones. These often-overlooked internal APIs can access sensitive data not intended for public exposure. APIs have changed the game for attackers, making it imperative to prioritize the security of all assets accessible through APIs, including those not expected to be publicly exposed.” He added, “We are pleased to combine our innovative API security solutions with Vercara's innovative WAF and DDoS services to deliver advanced, holistic API protection. This collaboration reinforces our commitment to provide unparalleled security measures for businesses reliant on APIs.” Cequence Security's UAP platform is unparalleled in addressing all phases of the API security lifecycle. It provides: Discovery: A continuous API attack surface discovery management product that assesses your application footprint, offering a complete inventory of external APIs. Compliance: A security posture management product that identifies security risks in APIs, ensuring compliance with specifications, security test requirements, and governance best practices. Protection: Detects and prevents sophisticated automated API attacks and business logic abuse using advanced machine learning rules, providing real-time protection without relying on third-party components. About Cequence Security Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection across all internal and external APIs to defend against attacks, targeted abuse, and fraud. Requiring less than 15 minutes to onboard an API without requiring any instrumentation, SDK, or JavaScript integration, the flexible deployment model supports SaaS, on-premises, and hybrid installations. Cequence solutions scale to handle the most demanding Fortune and Global 2000 organizations, securing more than 8 billion daily API calls and protecting more than 3 billion user accounts across these customers. To learn more, visit www.cequence.ai. About Vercara Vercara is a purpose-built, global, cloud-based security platform that provides layers of protection to safeguard businesses’ online presence, no matter where attacks originate or where they are aimed. Delivering the industry’s highest-performing solutions and supported by unparalleled 24/7 human expertise and hands-on guidance, top global brands depend on Vercara to protect their networks and applications against threats and downtime. Vercara’s suite of cloud-based services is secure, reliable, and available, delivering peace of mind and ensuring that businesses and their customers experience exceptional interactions all day, every day. Pressure-tested in the world’s most tightly regulated and high-traffic verticals, Vercara’s mission-critical security portfolio provides best-in-class DNS and application and network security (including DDoS and WAF) services to its Global 5000 customers and beyond. For more information, visit vercara.com.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Spotlight

Directive Consulting

Directive Consulting

Directive does beautiful search marketing for B2B and enterprise companies that share our values. We redefine the global standard for how marketers work, live, and grow. We are a group of SEO, PPC and content experts who are passionate about working with the best B2B brands in the world. When we are...

Events

Resources