tactics

Results 201 - 225 of 296Sort Results By: Published Date | Title | Company Name
Published By: Oracle Social Cloud     Published Date: Feb 17, 2015
Last year's Super Bowl was disappointing on every level and simply could not live up to the hype. 2015 could not have provided a more opposite result. This was the year of the emotional rollercoaster. NBC is known for their heartfelt sports coverage and has mastered the art of storytelling, all on full display for Sunday's game. The network leveraged all their best tactics with outstanding results. The game was high drama at its best and kept the audience engaged to the very end. Brands had serious competition from the games itself this year, but brought their own flood of emotions with some familiar storylines that garnered significant social conversation volume to very unexpected commercials eliciting strong negative feedback. In this analysis we will examine how brands used social media to continue the conversation, leverage assets and advocates, and even create intentional mistakes to earn attention.
Tags : 
oracle, brand strategy, super bowl, social media strategy, engagement, continuing the conversation
    
Oracle Social Cloud
Published By: Campaigner     Published Date: Apr 30, 2015
We created this handbook to help you become the world’s greatest email marketer. On these pages, we will introduce some of the same advanced email marketing techniques and tactics used by marketing departments at the largest and most sophisticated companies.
Tags : 
content marketing, email marketing, smart content, data analytics, crm, customer engagement, email campaigns
    
Campaigner
Published By: Citrix Online     Published Date: Jul 02, 2010
This new eBook reveals the strategies used by Apple CEO Steve Jobs to deliver powerful presentations that inform, educate and entertain. Learn Jobs's 10 secret tactics that will have you presenting like a pro in no time.
Tags : 
citrix online, presentation methods, steve jobs, public communication, gotomeeting
    
Citrix Online
Published By: Citrix Online     Published Date: Jul 02, 2010
This white paper presents a summary of the survey results regarding their marketing plan and tactics, identifies top trends from this survey, and also discusses the increasingly important role of Webinars in small business marketing in 2009.
Tags : 
citrix online marketing, gotowebinar, webinar, small business, lead generation
    
Citrix Online
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications
    
IBM
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive, architecture, network, application, cia triad, confidentiality, integrity
    
F5 Networks Inc
Published By: WebiMax     Published Date: Nov 25, 2009
It may be easily understood SEO can immensely help marketing efforts, yet with so many providers available, the process of deciding upon a service can be confusing. First, it is important to understand what search engine optimization is and what it can do for your company. Basically, SEO providers employ a number of tactics to gain positive momentum for your Web site on the search engines. Using specific, germane words and phrases related to a site's goods and services, an SEO service helps to make the site widely recognized by consumers and attract more revenue.
Tags : 
webimax, seo, search engine optimization, optimized, service provider
    
WebiMax
Published By: GoToWebinar     Published Date: Nov 20, 2009
Do you know your numbers? If getting more high-quality leads from your marketing events spend is a top priority, then it pays to know the return on investment of your marketing events tactics. This new white paper explores which marketing events offer the greatest return on investment for your budget and staff. Read survey results of marketers using different types of events, and then calculate your own event costs with the marketing events ROI calculator.
Tags : 
citrix gotowebinar, online content strategy, lead generation, marketing, buyers, integration, b2b, content management
    
GoToWebinar
Published By: GoToWebinar     Published Date: Jul 16, 2010
Webinars are powerful tools - especially when you know how to create, promote and deliver them like a power user. Interactive online webinars have emerged as the gold standard in B2B marketing. This new eBook provides webinar tips, tactics and techniques from some of the sharpest minds in B2B marketing and includes helpful checklists for promoting a webinar, integrating social media, creating content and more. "
Tags : 
webinar event, online conference, technology configuration, event scheduling, promotion, content creation, analytics, citrix
    
GoToWebinar
Published By: Cisco     Published Date: Nov 30, 2016
Nearly two-thirds of B2B marketers say online events are by far one of the most effective content marketing tactics.1 But carrying out a successful event requires some simple, yet important steps to ensure both marketers and attendees gain all of the benefits of online events, including real-time experience, engagement, and convenience. If you’re ready to produce your first online event, this 12-step checklist takes you through the entire process — from planning to post-event follow-up — to provide you with the information you need to get started. 1
Tags : 
    
Cisco
Published By: appia     Published Date: Jan 21, 2014
Behind every successful app is a great user acquisition strategy. In our whitepaper, Four Tips for Driving Mobile Advertising Success, learn four essential tactics creating successful mobile advertising program.
Tags : 
appia, mobile marketing, mobile targeting, localization, tracking, app marketing, iphone, blackberry, android, iphone marketing, mobile advertising, mobile target
    
appia
Published By: Vocus     Published Date: Jun 10, 2014
Tune into this webinar to learn five tactics your company can utilize to achieve outstanding email marketing marketing.
Tags : 
vocus, marketing software, pr software, email marketing, email marketing roi, open rates, deliverability, email engagement
    
Vocus
Published By: Epicor     Published Date: Jun 30, 2014
With your manufacturing operations already running close to capacity, the traditional ways of gaining new capacity is to make large capital investments, or to outsource some of the new manufacturing demand. These are challenging tactics as getting new resources in line will take time and there is no guarantee that the numbers will continue to climb. You do, however, have a third option available to you.
Tags : 
epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing, enterprise applications
    
Epicor
Published By: InReality     Published Date: Aug 10, 2015
Consumers are No Longer Predictable, and their Path to Purchase is No Longer Linear… A decade ago, you had a fairly straightforward understanding of how your customers moved through their path to purchase. It was linear. Predictable. And consistent. But, the rapid increase of mobile and ecommerce channels has diffused the consumer’s journey into a labyrinth of shopping options. And, these consumers are now learning more, engaging faster and expecting greater value, convenience, and hyper-relevant offers catered specifically to their needs. How you respond to this change will either accelerate or isolate your brand from the market.
Tags : 
inreality, consumer insight, mobile channels, ecommerce channels, retail solutions, retail marketing
    
InReality
Published By: Arthur J. Gallagher & Co.     Published Date: Oct 26, 2015
Employers of choice are committed to providing their employees with a rich benefits and compensation program while trying to decrease or maintain operating costs. Our 2015 survey - with over 3,000 participating organizations - covers everything from high-level questions about organizational priorities and benefit strategies, to current and future tactics related to medical and pharmacy benefits, wellness, work-life balance, retirement and employee communications. Download Gallagher's Benefits Strategy & Benchmarking Survey Executive Summary for a glimpse of what organizations are doing nationwide as they pursue their goals to compete, succeed and prosper in a competitive and constantly evolving market.
Tags : 
arthur j. gallagher, benefits survey, organizational priorities, medical benefits, pharmacy benefits, wellness, work-life balance, retirement, employee communications
    
Arthur J. Gallagher & Co.
Published By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Telerik     Published Date: May 31, 2016
Digital Business Transformation (DBT) is a focus of organizations ranging from small, non-profit associations to multi-billion dollar healthcare systems. The primary areas of DBT include moving from brick and mortar to online transactions, automation over human interactions and gaining immediate insight into activities to drive instant and constant improvement. At the forefront of DBT is Digital Marketing. Marketing’s primary job of gaining mindshare and communicating the right messages along each customer’s individual journey— from prospect to repeat buyer and brand advocate— lends itself to the digital medium. Marketing’s mission of continuous customer engagement depends on the ability to change strategies and tactics as needed.
Tags : 
telerik, marketing, digital marketing, technology platform
    
Telerik
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Falcon Social     Published Date: Dec 02, 2015
The aim of this handbook is to give the knowledge, tactics and tools to help brands better understand the value of their social marketing in terms of ROI.
Tags : 
falcon social, marketing roi, roi, social media marketing, social marketing
    
Falcon Social
Published By: Act-On     Published Date: Aug 28, 2012
In this Gleanster Deep Dive, analyst Ian Michiels discusses tactics for determining the ROI of social engagement for B2B, and demonstrates the Social Media Mean Performance Score (MPS) Dashboard.
Tags : 
social media roi, b2b marketing, social media engagement, gleanster, content marketing, social media metrics
    
Act-On
Published By: TreeHouse Interactive     Published Date: Jul 27, 2010
This quick guide-written by marketing automation expert Ardath Albee details practical strategies and tactics to use in retaining customers.
Tags : 
treehouse, marketing automation, b2b, b2c, branding, objectives, nurturing, channel relationships
    
TreeHouse Interactive
Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox, gold lasso
    
Gold Lasso
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee