Browse Definitions :
Definition

gated content / ungated content

Gated content is online materials, such as white papers, articles and videos, that require that users fill out a form before they can access them. The form may just ask for the user's name and email address or might demand more details, typically about their jobs and organizations. The form pages are sometimes referred to as information gates or registration walls.

Ungated content, on the other hand, is presented to the user upon request. There may be some option to sign up or provide data for an incentive -- typically more content or a newsletter -- but the user can access the data without providing any information.

The purpose of gated content is lead generation: acquiring user information for potential leads or prospects. However, because Google doesn't crawl content that's behind a wall, fewer people will find the content in the first place. According to content marketing expert David Meerman Scott, ungated content is downloaded 20 to 50 times more often than gated content. Scott makes his own content freely available and ungated and suggests that marketers either follow suit or at least reduce the number of fields in the forms presented to users.

Chris Keller on using non-gated content to increase high-quality leads:

This was last updated in July 2016

Continue Reading About gated content / ungated content

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close