tactics

Results 101 - 125 of 300Sort Results By: Published Date | Title | Company Name
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: FireEye     Published Date: Sep 13, 2012
This report provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations' networks today.
Tags : 
fireeye, threat report, cybercriminals, apt, 1h 2012, security, business technology
    
FireEye
Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media
    
Forrester
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Published By: Gigya     Published Date: Jun 08, 2015
As channels fragment and consumer identities multiply, businesses are struggling to achieve a single customer view. This guide provides actionable strategies to achieve this “holy grail” to better understand your audience, build relevant experiences and grow customer relationships. Get tactics and examples to help you: Identify your customers across channels and devices Manage today's volume and variety of customer data Integrate and apply data across marketing campaigns Build more personalized customer journeys
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login
    
Gigya
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords
    
Godfrey
Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox
    
Gold Lasso
Published By: Gold Lasso     Published Date: Jul 13, 2007
Successful delivery is the driving force behind an effective email marketing campaign. The purpose of this paper is to provide a summary of terms (or jargon) related to e-mail deliverability, increase general knowledge of the concept, discuss delivery barriers and provide tactics to overcome these issues.
Tags : 
email delivery, deliverability, inbox, email marketing, enewsletter, email newsletter, e-newsletter, newsletter
    
Gold Lasso
Published By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToMeeting
Published By: GoToWebinar     Published Date: Nov 20, 2009
Do you know your numbers? If getting more high-quality leads from your marketing events spend is a top priority, then it pays to know the return on investment of your marketing events tactics. This new white paper explores which marketing events offer the greatest return on investment for your budget and staff. Read survey results of marketers using different types of events, and then calculate your own event costs with the marketing events ROI calculator.
Tags : 
citrix gotowebinar, online content strategy, lead generation, marketing, buyers, integration, b2b, content management
    
GoToWebinar
Published By: GoToWebinar     Published Date: Jul 16, 2010
Webinars are powerful tools - especially when you know how to create, promote and deliver them like a power user. Interactive online webinars have emerged as the gold standard in B2B marketing. This new eBook provides webinar tips, tactics and techniques from some of the sharpest minds in B2B marketing and includes helpful checklists for promoting a webinar, integrating social media, creating content and more. "
Tags : 
webinar event, online conference, technology configuration, event scheduling, promotion, content creation, analytics, citrix
    
GoToWebinar
Published By: GoToWebinar     Published Date: Apr 06, 2011
Watch this on-demand webinar to hear Matthew Grant delve into the findings of MarketingProfs' latest original research, revealing which marketing tactics deliver results and which show the most promise for 2011.
Tags : 
lead generation, brand awareness, social media, online marketing, b2b marketing, matthew grant, citrix webinar
    
GoToWebinar
Published By: Group M_IBM Q3'19     Published Date: Jul 19, 2019
Hear the highlights from industry leaders presented their experience in digital transformation at Reinventing Financial Services 2019. Hearing from executives leading IT, operations, and lines of business from companies such as USAA, Bank of America, HSBC, Prudential, and many others in this session, we’ll cover the strategies and tactics for building the platforms necessary for reinventing customer experience, empowering employees and creating te
Tags : 
    
Group M_IBM Q3'19
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Powerful IT doesn’t have to be complicated. Hyperconvergence puts your entire virtualized infrastructure and advanced data services into one integrated powerhouse. Deploy HCI on an intelligent fabric that can scale with your business and you can hyperconverge the entire IT stack. This guide will help you: Understand the basic tenets of hyperconvergence and the software-defined data center; Solve for common virtualization roadblocks; Identify 3 things modern organizations want from IT; Apply 7 hyperconverged tactics to your existing infrastructure now.
Tags : 
    
Hewlett Packard Enterprise
Published By: HotSchedules     Published Date: Apr 25, 2018
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your Gen Z employees while keeping your restaurant compliant with today’s labor laws? Research has found Gen Z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules
Published By: HotSchedules     Published Date: Jan 17, 2019
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your generation z employees while keeping your restaurant compliant with today’s labor laws? Research has found generation z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, marketing analytics, marketing data, crm, customer relationship management, business technology
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, social media marketing, ibm, unica, crm, customer relationship management, top-line marketing strategy
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
While a business case is all about the numbers, knowing how and when to push the proposal through the approval process requires an understanding of the psychology behind how proposals are selected and funded. Learn the tools and strategies to develop a business case and gain approval within your company.
Tags : 
business case, best practices, success tactics, leadership, persuasion, decision making, selling
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee