RSS feed Get our RSS feed

News by Topic

email

Results 151 - 175 of 1365Sort Results By: Published Date | Title | Company Name
By: Esker     Published Date: Feb 03, 2017
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, Addressing Manual Order Management, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: Make every order electronic Allow customers to send fax/emails Increase speed, visibility & accuracy Eliminate manual data entry Manage growth without adding staff
Tags : best practices, business optimization, business management, productivity, business intelligence, business process automation, business process management
     Esker
By: Adobe     Published Date: Oct 30, 2014
This guide aims to help transform your email marketing strategy into a money-making machine
Tags : a guide to email marketing, transforming email marketing, email marketing tactics, email marketing, content management systems, interactive marketing, marketing software, web analytics
     Adobe
By: Adobe     Published Date: Oct 30, 2014
This guide aims to help transform your email marketing strategy into a money-making machine
Tags : a guide to email marketing, transforming email marketing, email marketing tactics, email marketing, content management systems, interactive marketing, marketing software, web analytics
     Adobe
By: Adobe     Published Date: Oct 22, 2014
Sometimes email is the forgotten marketing channel. It’s not as new or topical as social or mobile, but it’s as reliable and profitable as ever. A study from the Direct Marketing Association says that email provides a $39.40 return on every dollar invested into it. We’ve produced a marketer’s guide that discusses the next frontier of email marketing. Learn the advantages of triggered and retargeted emails, and get real-world insights into smart email marketing from C Spire Wireless and others.
Tags : marketing channels, marketing guide, triggered emails, re-targeted emails, emerging marketing, internet marketing, marketing research
     Adobe
By: Adobe     Published Date: Apr 30, 2015
Learn the advantages of triggered and retargeted emails, and get real-world insights into smart email marketing from C Spire Wireless and others.
Tags : email marketing, real world insights, roi, customer lifecycle, customer relationships, mobile devices, content management systems, interactive marketing
     Adobe
By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
     Sophos
By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : b2b integration, customer loyalty, ibm, customer growth
     IBM
By: Esker     Published Date: Jul 15, 2013
Improving order management via a SaaS environment.
Tags : order processing, sales order processing, sales orders, order management order automation, edi, customer service, fax orders, email orders
     Esker
By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption
     Voltage Security
By: SmartFocus     Published Date: Aug 25, 2015
Combining, streamlining and analyzing data is still the biggest single struggle for marketers. Most marketers can’t use data for simple offer based marketing, let alone sophisticated contextual marketing. Part 1 of our ‘Overcoming Marketing Challenges’ White Paper series discusses how data has become a barrier for many marketers and four data steps you can take to engage more successfully with your customers.
Tags : data, data marketing, personalization, contextualization, email marketing, customer behavior, segmentation, customer engagement
     SmartFocus
By: Silverpop     Published Date: Feb 04, 2013
This ebook gives you a good starting point to help you take your email program to a higher level.
Tags : email marketing, engagement, crm, social, mobile, engegement, testing, optimization
     Silverpop
By: BlueHornet     Published Date: Jun 06, 2008
As you look ahead to 2008 for new opportunities to improve your email marketing efforts, we encourage you to look back for a minute, as well. Remember the “email is a courtship” metaphor and “one-to-one” techniques espoused by Seth Godin and others? Even as far back as 1999, those ideas resonated strongly with all of us because they were dead-on. Jump ahead to 2008, and it’s pretty obvious that marketers have failed to realize the potential in offering true relationship email marketing to customers.
Tags : email marketing, email messaging, blue hornet, bluehornet, email marketing services/software
     BlueHornet
By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email
     EmailDirect
By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
     Sigaba
By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
     Menlo Security
By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : email security, email fraud, whaling, mimecast, loss prevention
     Mimecast
By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : healthcare, ransomware, ransomware attack, seg, secure email gateway
     Mimecast
By: Adobe     Published Date: Aug 02, 2017
Marketers can personalize interactions using information that spans complete anonymity to full authentication, with a middle range in which identified data may be used intermittently. The distinction between anonymous and authenticated hinges on personally identifiable information (PII)—information that can be used alone, in combination, or in context to contact an individual. This information includes unique and partial identifiers such as name, address, phone number, and email address, as well as financial, employment, or other data associated with an individual.
Tags : financial services, financial security, data security, cloud security, network security, business protection, adobe
     Adobe
By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : burton group, best practices, malware, security, email security, network security, content filtering
     Burton Group
By: Trend Micro SaaS     Published Date: Mar 17, 2009
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service
     Trend Micro SaaS
By: GFI     Published Date: Jun 12, 2007
A buyers' guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why.
Tags : buyers guide, buyer's guide, buying guide, antispam, anti spam, anti-spam, spam, network security
     GFI
By: GFI Software     Published Date: Mar 21, 2011
This white paper shall cover the following topics: What archiving is and how it integrates with Microsoft Exchange or a messaging solution; What stubbing is and why Microsoft does not recommend the use of stubbing; How Journaling in Exchange can allow efficient email archiving; How does stubbing compare with Journaling?
Tags : gfi, email archiving, compliance, microsoft exchange, messaging solution, microsoft, journaling
     GFI Software
By: Rand Secure Archive     Published Date: Jun 06, 2013
This whitepaper discusses how creating an email archiving process before embarking on a Microsoft Exchange upgrade can eliminate these problems, saving time and money for organizations.
Tags : archiving, logical, microsoft exchange, security
     Rand Secure Archive
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics