RSS feed Get our RSS feed

News by Topic

brand

Results 401 - 425 of 1507Sort Results By: Published Date | Title | Company Name
By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
     CyberSource EMEA
By: Cymfony     Published Date: Feb 22, 2007
This white paper summarizes the status of current trends in public relations and provides PR professionals with recommendations for actions to take in 2007 to begin to evolve their communications strategies and tactics.
Tags : branding, emerging marketing, press release marketing, blog marketing, blogging, social media, public relations, cymfony
     Cymfony
By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
     Cymfony
By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
     Cymfony
By: Cymfony     Published Date: Feb 22, 2007
Social media - online sites like blogs and discussion boards where consumers create and share information and opinions directly with each other - are beginning to affect brands. Download this white paper now to understand the importance of a social media strategy, and how to make the case to management.
Tags : blogs, branding, blog, social media, sales & marketing software, marketing automation, customer interaction service, cymfony
     Cymfony
By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
     Cymfony
By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
     Cymfony
By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
     Darktrace
By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : certifiedmail technology, email security, message security, encryption, security
     DataMotion
By: Deliver     Published Date: Jul 25, 2011
How decoupling creative and production in digital marketing generates higher ROI, strengthens brands and produces competitive advantage through increased efficiency and effectiveness.
Tags : creative, production, digital marketing, decoupling, increased efficiency and effectiveness, interactive marketing
     Deliver
By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
     Dell
By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
     Dell EMC
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: Demand Frontier     Published Date: Mar 11, 2016
An energy manufacturing company with Refining and Marketing, Midstream and Chemicals expertise. The company has a strong focus on operational excellence – personal and process safety, environmental stewardship, reliability and cost efficiency. As one of the largest finished lubricants suppliers in the United States, Phillips 66 offers four premier lubricant brands, including: 76, Conoco, Phillips 66, and Kendall in the U.S. and 69 other countries.
Tags : manufacturing, marketing, best practices, digital media, communications, traditional marketing
     Demand Frontier
By: Demand Frontier     Published Date: Mar 11, 2016
An energy manufacturing company with Refining and Marketing, Midstream and Chemicals expertise. The company has a strong focus on operational excellence – personal and process safety, environmental stewardship, reliability and cost efficiency. As one of the largest finished lubricants suppliers in the United States, Phillips 66 offers four premier lubricant brands, including: 76, Conoco, Phillips 66, and Kendall in the U.S. and 69 other countries.
Tags : manufacturing, marketing, best practices, digital media, communications, traditional marketing
     Demand Frontier
By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : dependable solutions, licensing, edi, electronic data interchange, sku, other
     Dependable Solutions
By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
     DigiCert
By: DMD Systems Recovery     Published Date: Dec 02, 2016
The purpose of ITAD is to ensure that every possible step is taken to protect the reputation of your brand while also maximizing your return on investment.
Tags : dmd systems, it asset disposal, itad, electronic waste
     DMD Systems Recovery
By: DNN Corp.     Published Date: May 14, 2014
Forrester Research shares key findings from their report on branded communities in B2B marketing in this on-demand webinar. While Facebook and Twitter have failed to reach their full potential, B2B marketers are reaping the rewards of branded communities: driving lead generation and revenue, as community members influence both prospects and customers. Watch this replay as Forrester's Kim Celestre describes the tactics that B2B marketers are finding the most successful and provides a business case for creating and managing your own branded community.
Tags : dnn, online communities, marketing communities, community management, email marketing, emerging marketing, social media, traditional marketing
     DNN Corp.
By: Dotmailer     Published Date: Feb 23, 2016
This guide examines how brands are employing technology to engage buyers and strengthen the customer relationship.
Tags : ecommerce marketing, email marketing, marketing automation, magento best practices, marketing technology for ecommerce, martech for ecommerce, magento enterprise best practices, magento community best practices
     Dotmailer
By: Dotmailer     Published Date: Mar 09, 2016
This whitepaper outlines 7 tips for delivering an improved CX using email, with examples from Magento powered retailers.
Tags : customer experience, brand, magneto, email, marketing, search marketing, email marketing, website development
     Dotmailer
By: Dotmailer     Published Date: Nov 06, 2018
This year’s Hitting the Mark showcased the email and customer experience tactics of 100 global brands. The report revealed both the triumphs and pitfalls of marketers as they bid to foster everlasting relationships from the inbox to the counter. This guide draws inspiration from the winning tactics adopted by brands big and small. Implement these now and you could come up top in next year’s Hitting the Mark.
Tags : 
     Dotmailer
By: Dotmailer     Published Date: Nov 06, 2018
The current digital marketing environment is being steered, not by the brand, but by the hyper-consumer. In today’s fast-paced, ‘always-on’ world, companies must challenge their status quo to remain competitive. To keep up with on-the-go consumers, marketers need to utilize powerful technology and leverage the right data to compose brilliant, meaningful messages that compel customers to act fast. But as this study reveals, a surprising number of brands are failing to captivate audiences and adopt practices that are proven to beat the clutter of the inbox.
Tags : 
     Dotmailer
By: Dotmailer     Published Date: Nov 06, 2018
Consumers have witnessed unprecedented socioeconomic, political and technological change in the past 30 years. Shifts in behavior and demand have opened up new markets, while existing ones have expanded their offerings, triggering an avalanche of products and services. Ecommerce has emerged as a by-product of consumerism; the digital marketplace has freed both consumers and merchants from the restraints of proximity. This has resulted in spiraling growth. Marketing in 2018 is unrecognizable to the marketing of the 1980s. Back then there were only a few communication channels available, whereas now there are a myriad of options. Thanks to the digital revolution, the shopfront now sits on the consumer’s coffee table. Brands now cater for empowered customers, and as such, it’s become tougher for marketers to know where to allocate their budget and how to keep their message consistent. This whitepaper will discuss how marketing channels have evolved to fit the needs of omnichannel consu
Tags : 
     Dotmailer
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics