RSS feed Get our RSS feed

News by Topic

email

Results 201 - 225 of 1411Sort Results By: Published Date | Title | Company Name
By: Groove     Published Date: May 16, 2018
Build.com is a well-established online retailer of home improvement products. Their sales team was stretched thin, and they needed a way to ensure accurate records in Salesforce in a way that didn’t hurt overall sales and customer outreach. While they were initially drawn to Groove for the Salesforce Email Sync, they soon discovered more ways to turbocharge their sales effort with personalizable drip campaigns through Flow.
Tags : 
     Groove
By: Groove     Published Date: May 16, 2018
Trader Interactive provides marketing services and technology solutions to customers across seven verticals. Their customer support team was bogged down with associating support requests with the appropriate cases in Salesforce, and they needed a solution to streamline their work. Now, the customer support team enjoys Gmail integration with Salesforce, and the sales team takes advantage of multi-step campaigns, email tracking, and much more. Overall, they’ve been able to work more efficiently and provide better value to their customers. Let’s check out their story.
Tags : 
     Groove
By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
     Curalate
By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : anti-phishing, cyber security, secure email gateway, url filtering, mimecast
     Mimecast
By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : phishing, email threats, cyberattack, email protection
     Mimecast
By: IBM Marketing Cloud     Published Date: Sep 26, 2016
Download this Benchmark Study and discover how you measure up across 25 open, click-through, list churn and mobile metrics.
Tags : marketing metrics, marketing, mobile, mobile marketing, mobile metrics, email marketing services/software
     IBM Marketing Cloud
By: IBM Marketing Cloud     Published Date: Nov 11, 2016
Con el exclusivo "Estudio de benchmark sobre métricas de email marketing" los datos de la industria - y mucho más - están a su alcance. Descubra cómo usted puede medir los resultados de open, click-through rate.
Tags : marketing metrics, marketing, mobile, mobile marketing, mobile metrics
     IBM Marketing Cloud
By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
     Sophos
By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
     Sophos
By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Sophos
By: Concur ENT     Published Date: Nov 07, 2017
Concur’s Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : auditing, configuration, reporting, data, email reminders, communication, concur
     Concur ENT
By: Concur     Published Date: Aug 15, 2017
At Concur, we receive a lot of questions about the best way to audit expense claims. Often the approaches to audit vary greatly by industry and company culture. It doesn’t have to be confusing. In this report, we hope to provide a clear perspective that can help every business identify ways to improve their audit process.
Tags : reporting, configuration, auditing, email reminders, data, communication, concur, maxus
     Concur
By: Egress ABM Pilot     Published Date: Dec 07, 2017
This white paper is about the sinking feeling you get when you realise you’ve sent an email to the wrong person, attached the wrong file, or uploaded the wrong document to a file sharing site.
Tags : 
     Egress ABM Pilot
By: Oracle     Published Date: Sep 26, 2019
As marketers chase after the same people with the same tactics, traditional marketing has become less worth the time—and the money. Email outreach worked until spam clogged up inboxes. Content marketing worked until everybody started to put out sub-standard material. And search engine marketing worked until it became inundated with new players clamoring for attention. Even inbound tactics aren’t delivering the results they once did. And as the need for performance continues to climb, so does the status of account-based marketing (ABM). In the B2B sphere it’s on the tip of everyone’s tongue. Download this whitepaper to learn more about ABM, a potent approach that puts sales and marketing together.
Tags : 
     Oracle
By: Oracle     Published Date: Sep 30, 2019
Digital marketing. You hear it everywhere. As you and all your competitors know, it’s: A marketing approach that leverages online channels like email, websites, social media, and display advertising to deliver content that influences opinions and sells products and services. But to effectively execute a digital marketing strategy, you’ll need a marketing automation system that can follow a customer’s lead around the web and offer the best recommendations at the best times to deliver a more relevant "1-to-you" customer experience.
Tags : 
     Oracle
By: Avaya     Published Date: Dec 18, 2013
Your contact center is a hotbed of activity, constantly processing calls and emails, chats and social media posts, problems and solutions. As a result, it generates the kind of “big data” that other departments wish they had. But collecting that data is just the beginning. The next step is turning it into a plan of action.
Tags : avaya, big data, contact center, social media
     Avaya
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
     ZScaler
By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
     ZScaler
By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
     ZScaler
By: Genesys     Published Date: May 14, 2013
Today, the gap between a customer’s expecta-tions and the service they receive is huge. Customers are increasingly knowledgeable about the products they use, and demand value-added, personalized customer service in real-time, using voice, text-based media types like email and chat, and social media.
Tags : genesys, customer service, social media, personalized customer service, text-based media, people management
     Genesys
By: LivePerson     Published Date: May 17, 2016
At the end of last year, the US alone had 435 million smart mobile devices in use — that’s 35% higher than the total US population. Among smartphone users, 68% use messaging apps regularly. And 84% of smartphone engagement with apps is spent communicating via text, email, and social channels. What does this mean for brands? The current state of CX is broken. Brands focus too much on channel and transaction, ignoring the customer’s preferences, and, ultimately, negatively affecting their bottom line. But wherever there’s a disconnect, there’s also opportunity. In increasing numbers brands are turning to messaging platforms and apps to offer more efficient, convenient customer service.
Tags : liveperson, idc, consumer relations, mobile, smartphones, mobile apps, brand engagement
     LivePerson
By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
     Delphix
By: ServiceNow     Published Date: Jul 09, 2015
ServiceNow surveyed nearly 1,000 managers in the US and the UK to understand the effectiveness of the tools and processes in their corporate environment. Results revealed nearly two days a week are spent on administrative tasks that are not core to their jobs. There’s an exponential impact on an organization’s top and bottom lines as employees have less time to do their jobs and it takes more people to complete the job. Learn about how your organization can overcome the obsessive use of email and spreadsheets to get real work done.
Tags : 
     ServiceNow
By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
     MobileIron
By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
     Mimecast
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics