Inbound marketing methodologies are on the rise. Companies like IBM and Adobe are continuously pushing the envelope with new and innovative Enterprise Marketing software developments. As marketers, we need to follow these methods and software developments to solidify an effective model for our respective markets. One of the best practices at our disposal today is personalized B2B retargeting. By focusing on identifying incoming traffic, marketers can accurately recognize companies with legitimate interest. Marketers can then use that information to reach out with relevant sales propositions and dynamic creative web materials.
When implementing a new B2B retargeting strategy, it is important to determine whether certain mechanisms and software are in place. Before jumping into it, here are two questions to bear in mind:
Set your analytical tools to capture visitor sessions using IP addresses. Try to configure it in a way that each session from the same address or range is automatically aggregated together. Platforms like Clicky provide a great breakdown for the IP traffic coming through your website – they are definitely on my list of recommendations.
The goal here is to identify large enterprises that use their own IP address. Some software available include platforms like Hexillion and KickFire. Each platform provides a different set of resources to suit different business requirements. Additionally, most software provide a network range for the company address when an IP is identified so that whole company can be targeted with online ads. Optional technologies for this step of the process include iPerceptions and LeadForensics:
Once a company is identified, the information is ready to pass through a demand side platform (DSP) to automatically generate a specified campaign. These campaigns can use dynamic creative banners/ads that factor company related information, thus tailoring directly to that business.
A campaign with dynamic creative materials will usually run for a defined period, depending on the specification. For example – you identified CIBC as a visitor. The next time they visit your website, they may see “Welcome CIBC”, in addition to other sections of the website tailored for the banking and financial industry. This is achieved by IBM Interact functioning as a smart ad server and altering portions of the website on the fly based on the known customer and their industry.
Tracking returning visitors is another great way to monitor campaign performance. This is done by placing an image pixel within the dynamic creatives in the campaign. Even if the person is not interacting with any advertisement but still returns to your website, we can assume there is some level of success with the campaign in regards to return-users.
At this point, you should be seeing indicators of people clicking on banner ads and going through your website. If you see that most people are not engaging with your call-to-actions (contact sections, forms, registrations, etc.), it’s time to pass your data to the sales team. This is done by sending data through a data exchange facilitator, such as IBM UBX, and then back to your CRM as a sales lead. A company like IBM can easily build and maintain a database of large and mid-size company IP addresses. Nonetheless, most companies will likely be visible in the traffic logs. So by linking visitors with IP data in real-time and connecting them to the IP database, the entire website can be changed to an industry vertical model.
With these 6 steps, start visualizing a flowchart of how you can begin capturing all that wonderful incoming data. Put in the time to determine which software options best suit your business practices and budget. Remember, with all that information becoming more available to companies and marketers themselves, the potential for success is endless
“PLUS COMPANY” AND “COMPANY” MEAN PLUS COMPANY CANADA INC. AND ITS AFFILIATES AND BUSINESS UNITS IN CANADA.
Plus Company respects the privacy of its customers.
This Policy concerns you. It describes how we collect, use, disclose and protect your personal information, including when you visit our website or any website we own, operate or control (collectively, the “Site”), when you contact us by phone or email or when you communicate with us via social media.
We may update this Policy (see “Changes to the Policy” below).
You should read this entire Policy before submitting information to us or using our Site. If you submit personal information to us, we assume that you authorize us to use and disclose it as described in this Policy.
Personal information is information that identifies you directly or indirectly, on its own or with other information, such as your name, contact details or IP address.
We may make full use of all information that is de-identified, aggregated or otherwise not in personally identifiable form.
We collect personal information …
When do we collect your personal information?
What type of personal information do we collect?
Why do we need it?
As part of our business operations, we may disclose personal information to the following categories of third parties:
We currently retain personal information in North America.
We may disclose personal information in locations other than your country, province or state of residence, where privacy laws may differ.
If your personal information is used outside your country, province or state of residence, it is subject to the laws of the place where it is located and may be disclosed to governments, courts, law enforcement agencies or regulatory bodies of that place, or disclosed in accordance with the laws of that place. However, our practices regarding your personal information will remain governed by this Policy and by applicable privacy laws.
We will retain your personal information (collected through online and offline methods) for as long as it is necessary for the purposes described in this Policy. We will also retain and use your personal information to the extent necessary to comply with our legal obligations, resolve disputes and enforce our legal agreements and policies.
We take reasonable, appropriate steps to protect personal data from loss, misuse and unauthorized access, disclosure, alteration or destruction, whether in transmission or storage. Remember, however, that no security system is infallible and that transmission over the Internet is not perfectly secure or error-free.
We use a secure server. Only authorized persons have the right to access this information, which they are required to keep strictly confidential.
Right to access and correct
You may request access to and obtain a copy of the personal information we hold about you.
If any personal information about you is inaccurate, incomplete or ambiguous, or if the collection, disclosure or retention of such personal information is not permitted by law, you may require that it be rectified.
You can also ask us for information about the source of your personal information (if it was not obtained from you), as well as the names of persons who have access to your information and details about how long it is kept.
Right to withdraw your consent
You may request to withdraw your consent to our use or disclosure of your personal information.
In most cases, withdrawing your consent means that we will no longer be able to offer you certain services. Otherwise, we will inform you of the consequences of refusal in our request for consent.
To exercise your rights, please send a request in writing, along with proof of identity, to our Privacy Officer at the contact information provided under How to contact us.
Once your request has been received, we will respond in writing within 30 days.