Skip to main content

Guidance for Target Marketing on AWS

Overview

This Guidance helps you implement geofence target marketing, offering one-to-one personalized recommendations and promotions. It can identify retail customers within the geofenced areas of their physical stores and engage them by push notifications, SMS, and email channels. Retail customer locations can be detected either through GPS or by pre-installed beacon devices within the stores. By extending existing marketing strategies, this Guidance not only enhances customer engagement but also drives foot traffic and potential sales based on retail customers' proximity to physical stores.

How it works

This architecture diagram shows an approach to implementing geofence target marketing, enabling personalized recommendations and promotions through push notifications, SMS, and email for retail customers detected through GPS or in-store Bluetooth beacons.

Well-Architected Pillars

The architecture diagram above is an example of a Solution created with Well-Architected best practices in mind. To be fully Well-Architected, you should follow as many Well-Architected best practices as possible.

This Guidance uses fully managed and serverless services, minimizing operational overhead. It seamlessly integrates Step Functions, a serverless orchestration service, which eliminates the need for manual coordination and management of the application components. This approach streamlines the deployment and maintenance processes, allowing for efficient resource allocation and scalability while reducing your operational burden.

Read the Operational Excellence whitepaper

This Guidance implements a robust authentication mechanism using your identity provider and Amazon Cognito, granting temporary security credentials to access backend resources. It enforces least privilege access through AWS Identity and Access Management (IAM) service roles, helping ensure each component operates with minimal permissions. Data in transit is secured through TLS encryption between the mobile client and services like AWS IoT Core and Location Service. Further, data at rest stored in DynamoDB is encrypted using AWS Key Management Service (AWS KMS), providing an additional layer of protection for sensitive information.

Read the Security whitepaper

EventBridge controls the event flow between various components in this Guidance, adopting a publish-subscribe (Pub/Sub) model that decouples the beacons data component (which includes AWS IoT Core and Lambda) from the orchestration component (which includes Step Functions). This decoupling allows AWS IoT Core to transmit events as soon as they are received from the client, while Step Functions processes these events, independently of event generation. All components are configured to send events to EventBridge, enabling the creation of specific logging rules and forwarding event logs to a centralized logging service such as Amazon CloudWatch.

Read the Reliability whitepaper

This Guidance uses purpose-built AWS services such as Location Service for tracking client locations, AWS IoT Core for real-time communications, and Amazon Cognito for mobile client authentication. It also uses DynamoDB, a highly performant database service, and allows customers to choose the required memory allocation for Lambda functions.

Read the Performance Efficiency whitepaper

The fully managed and serverless services in this Guidance, such as Amazon Personalize, Step Functions, Lambda, and DynamoDB, operate on a pay-as-you-go pricing model, meaning you pay only for what you consume. This approach provides the necessary elasticity without the need for capacity planning, as the services seamlessly scale to precisely match the required resources, eliminating over-provisioning or under-provisioning concerns.

Read the Cost Optimization whitepaper

The serverless services (including Lambda, Step Functions, EventBridge, and DynamoDB) and fully managed services (including Amazon Cognito, Location Service, Amazon Personalize, and Amazon Pinpoint) eliminate the need for you to manage underlying hardware, as AWS runs these services with the minimum required infrastructure. Designed using an event-driven architecture and asynchronous APIs, this Guidance eliminates idle waiting times between components and avoids consuming compute resources unnecessarily.

Read the Sustainability whitepaper

Disclaimer

The sample code; software libraries; command line tools; proofs of concept; templates; or other related technology (including any of the foregoing that are provided by our personnel) is provided to you as AWS Content under the AWS Customer Agreement, or the relevant written agreement between you and AWS (whichever applies). You should not use this AWS Content in your production accounts, or on production or other critical data. You are responsible for testing, securing, and optimizing the AWS Content, such as sample code, as appropriate for production grade use based on your specific quality control practices and standards. Deploying AWS Content may incur AWS charges for creating or using AWS chargeable resources, such as running Amazon EC2 instances or using Amazon S3 storage.