Browse Definitions :
Definition

tag management system

A tag management system (TMS) is software that can be used to manage tracking tags used in digital marketing. A tag is a short snippet of code that is added to a URL to collect data for analytics and digital marketing tools. A tag management system makes it possible for marketers and analysts to deploy and manage the tags on their site without relying wholly on IT.

Tags are the special headers on websites, tracking pixels used in advertisements and content that enables web analytics.

TMSs are used by marketers to manage digital marketing tags from various advertising services. TMSs serve to make changes to existing advertising services and between services easier and more agile. The systems manage tags for webpages, videos and apps. Real-time advertising is aided by TMS.

TMSs enable faster page loading performance and less complicated changes with less possible site outages. They allow changes to be made to tags such as trying a new service by simply adding the code snippet to the manager, setting rules and going live with the changes in as little as ten minutes without IT involvement.

Normally, changing from one ad tracking system to another or removing one of a number of used systems takes coordinated teams and the server updates can take weeks to complete. A tag management system replaces the tags used on a page with a container. Along with the tags themselves, the container code is used by tag managers to check rules in the software’s back-end for changes. Organizations looking into tag management should apply tag governance best practices together with a TMS. Website audits, specifically tag audits, are an important part of an effective tag governance strategy.

Top TMS vendors include Google Tag Manager, Tealium, Launch by Adobe, Qubit and Signal.

This was last updated in March 2019

Continue Reading About tag management system

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close