tactics

Results 76 - 100 of 300Sort Results By: Published Date | Title | Company Name
Published By: WNS     Published Date: Jun 21, 2017
Pricing needs to support a brand’s overall marketing platform. But is that enough to assure consistency of message throughout the organization? Given the far-reaching influence a price position has on a brand, and how various departments need to be aligned to support that position, an argument can be made for treating pricing as a core competency within the organization. What does this mean in real terms? Pricing is a day-to-day concern for numerous departments throughout the organization. While marketing might use pricing tactics to grow market share, sales teams chase volume goals, and product development teams lose sleep over the price image each product projects.
Tags : 
profitability, opportunity identification, monitoring and refinement, executive access, own price elasticity, cross price elasticities, price corridors
    
WNS
Published By: Bizible     Published Date: Jun 19, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
pipeline marketing, full-funnel marketing, revenue marketing, b2b marketing, conversion tactics, growth marketing, growth hacking, demand generation
    
Bizible
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
"Successful talent acquisition today puts candidates front and center. To accomplish the goals of recruiting and retaining top talent, providing excellent patient care, and consolidating healthcare with partners, payers need to think cost effectively. Updating talent acquisition tactics and technologies doesn't have to be expensive, though. Take note of how Best-in-Class companies recruit, hire, onboard, and retain employees. Learn more."
Tags : 
    
Oracle HCM Cloud
Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto
Published By: Adobe     Published Date: May 16, 2017
Chart your course with the latest trends. Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: • Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment • See how the latest trends and best practices help you acquire and engage your mobile customers • Learn how to transform your strategies around the latest mobile trends and tactics
Tags : 
    
Adobe
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers aren’t implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap – bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability
    
Lenovo and Intel®
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: Sitecore     Published Date: Mar 24, 2017
Getting started with personalization can seem overwhelming. We show you how with 10 easy tactics, from distinguishing between first-time web visitors and existing customers, to using real-time data to understand which calls to action will lead to conversions.
Tags : 
personalization, context marketing, digital experience, customer experience
    
Sitecore
Published By: Adobe     Published Date: Mar 03, 2017
Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: o Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment o See how the latest trends and best practices help you acquire and engage your mobile customers o Learn how to transform your strategies around the latest mobile trends and tactics Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: o Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment o See how the latest trends and best practices help you acquire and engage your mobile customers o Learn how to transform your strategies around the latest mobile trends and tactics
Tags : 
mobile maturity, digital experience, mobile marketing investment, mobile strategy
    
Adobe
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Cisco     Published Date: Nov 30, 2016
Nearly two-thirds of B2B marketers say online events are by far one of the most effective content marketing tactics.1 But carrying out a successful event requires some simple, yet important steps to ensure both marketers and attendees gain all of the benefits of online events, including real-time experience, engagement, and convenience. If you’re ready to produce your first online event, this 12-step checklist takes you through the entire process — from planning to post-event follow-up — to provide you with the information you need to get started. 1
Tags : 
    
Cisco
Published By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : 
veracode, security, devops, appsec, enterprise applications, business technology
    
Veracode
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: IBM     Published Date: Oct 13, 2016
Attend this webcast to learn ways you can: 1. Educate the acquisition team about your audience. What are their preferences and motivations? 2. Utilize marketing tactics to reach the talent you want. Are your recruiters storytellers? 3. Measure success. Are you evaluating your efforts along the way? 4. Engage in continuous improvement. What challenges are you tackling every day to make yourself a better recruiter?
Tags : 
ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters, human resource technology, business technology
    
IBM
Published By: Michael C. Fina     Published Date: Oct 10, 2016
A robust 25 page handbook of tips, tricks, and tactics that will help your managers engage their employees more effectively using proven recognition, communication, and emotional intelligence skills.
Tags : 
michael c. fina, employee engagement, management tips, employee recognition
    
Michael C. Fina
Published By: Movable Ink     Published Date: Oct 04, 2016
Financial Times showcased user-generated content with a live social feed in their emails. Check out our new eBook here and learn how contextual marketing can benefit your company with our top tips and tactics.
Tags : 
contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
Want to get better results with email? Grab our Email Marketing Guide for Financial Services. Gain insight on email campaigns, content strategies and tactics used by successful brands, plus advice from our team of experts.
Tags : 
contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
45% of emails are opened after an offer expires. See how Wyndham Hotels used a countdown timer to drive post-sale bookings and learn how to build best-in-class contextual email campaigns. Get our tips and tactics on building emails that see real results.
Tags : 
contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
Origins drove foot traffic to their stores using emails with geo-targeted store maps. See their campaign in our new guide and learn how to build best-in-class contextual email campaigns. Get our tips and tactics on building emails that see real results.
Tags : 
contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
Want to see the email campaigns used by the top travel and hospitality brands? The Travel & Hospitality Email Marketer’s Playbook is packed with content strategies, tactics and expert advice to elevate your email results.
Tags : 
contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
Financial Times showcased user-generated content with a live social feed in their emails. Check out our new eBook here and learn how contextual marketing can benefit your company with our top tips and tactics.
Tags : 
contextual marketing, email marketing, entertainment marketing, media marketing, contextual email, real-time marketing, publishing marketing
    
Movable Ink
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee