tactics

Results 151 - 175 of 298Sort Results By: Published Date | Title | Company Name
Published By: TreeHouse Interactive     Published Date: Jul 27, 2010
This quick guide-written by marketing automation expert Ardath Albee details practical strategies and tactics to use in retaining customers.
Tags : 
treehouse, marketing automation, b2b, b2c, branding, objectives, nurturing, channel relationships
    
TreeHouse Interactive
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: WebiMax     Published Date: Nov 25, 2009
It may be easily understood SEO can immensely help marketing efforts, yet with so many providers available, the process of deciding upon a service can be confusing. First, it is important to understand what search engine optimization is and what it can do for your company. Basically, SEO providers employ a number of tactics to gain positive momentum for your Web site on the search engines. Using specific, germane words and phrases related to a site's goods and services, an SEO service helps to make the site widely recognized by consumers and attract more revenue.
Tags : 
webimax, seo, search engine optimization, optimized, service provider
    
WebiMax
Published By: DellEMC and Intel®     Published Date: Sep 16, 2016
This case study explores how Land Rover BAR has sharpened its competitive edge with a VxRail Appliance to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
case study, land rover, vxrail, converged infrastructure, collaboration
    
DellEMC and  Intel®
Published By: EMC Converged Platforms     Published Date: May 26, 2016
Land Rover BAR has sharpened its competitive edge with VCE VxRail™ Hyper-converged Infrastructure Appliance incorporating VMware virtualization and EMC VNX storage and Isilon, to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
infrastructure management, business management, best practices, application performance, application management
    
EMC Converged Platforms
Published By: Act-On     Published Date: Jan 08, 2015
Ad Age, BtoB, and Act-On deliver the results of research into the factors of successful lead-generation strategies and tactics, with findings and recommendations most pertinent to the SMB marketer and sales director.
Tags : 
act-on, lead generation, management, smb, research, ad age, btob
    
Act-On
Published By: IBM US Smarter Buildings     Published Date: Apr 23, 2012
View this on-demand webcast to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, eam, asset management, workplace solutions
    
IBM US Smarter Buildings
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: Adobe     Published Date: Oct 24, 2018
Marketing leaders are asking their analytics teams to provide better insights into customers, prospects and journeys, and a more accurate assessment of the impact of marketing tactics. Use this research to find a digital marketing analytics tool to support your needs.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
Marketing leaders are asking their analytics teams to provide better insights into customers, prospects and journeys, and a more accurate assessment of the impact of marketing tactics. Use this research to find a digital marketing analytics tool to support your needs.
Tags : 
    
Adobe
Published By: SAS     Published Date: Sep 09, 2010
Our research shows that firms focused on rapid growth are blending offensive and defensive tactics in their efforts to pass their competitors. Get in-depth information from this whitepaper.
Tags : 
sas, decision-making, roi, management strategies, economic intelligence unit
    
SAS
Published By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: Adobe     Published Date: Aug 04, 2015
This report introduces Forrester's vision of mobile marketing for marketing leaders and provides specific strategic recommendations for brands dealing with demanding mobile customers.
Tags : 
brand tactics, branding, consumer mobility, customer experience management, digital marketing, emerging methods, marketing methods, mobile apps, mobile marketing, mobile web, omnichannel customer experience, mobility
    
Adobe
Published By: MoreVisibility     Published Date: Jan 11, 2010
This recorded webinar is ideal for marketers who want to boost their natural ranking on Google, and covers: Google Webmaster Tools, Google Site Map / External Site Maps, Content / Keyword Targeting, Leveraging Additional Google Channels, Tracking Results / Analytics and many more!
Tags : 
google, webmaster, keyword targeting, webinar, morevisibility, seo, targeting, rankings
    
MoreVisibility
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers aren’t implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap – bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media, consumer mobile devices, mobile advertising
    
Forrester
Published By: Adobe     Published Date: Feb 13, 2018
Chart your course with the latest trends. Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment See how the latest trends and best practices help you acquire and engage your mobile customers Learn how to transform your strategies around the latest mobile trends and tactics Simply fill out the form to download the report.
Tags : 
    
Adobe
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Bronto     Published Date: Sep 26, 2011
One Click has shown what can be done when retailers develop smart strategies and leverage the commerce-focused Bronto Marketing Platform. Their overall result? A year-over-year revenue increase of 142% in the first year on the Bronto platform. To gain insight on how you may employ some of the same tactics, read the full case study. Answer these short questions then click the Download now button.
Tags : 
remailing, triggered emails, list growth, list, email marketing, case study, e-store, e-commerce, targeted, automation, shopping cart, transactional messages, bronto, bronto software, bronto marketing platform
    
Bronto
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : 
vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency, it management, knowledge management, enterprise applications
    
VMTurbo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee