mail

Results 76 - 100 of 1553Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Feb 03, 2015
This guide aims to help transform your email marketing strategy into a money-making machine.
Tags : 
email marketing strategy, consumer responses to email, personalized and relevant emails, new trends for email marketing
    
Adobe
Published By: Adobe     Published Date: Apr 22, 2016
Download Putting Email Marketing in Context to learn: - How to overcome common challenges of personalisation and email - Best practices for implementing contextual email on a low budget - How to measure the effect of your contextual marketing campaigns
Tags : 
email marketing, personalised emails, marketing, customer service, customer interaction, contextual email
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
The multichannel campaign management (MCCM) market comprises vendors that seek to orchestrate company communications and marketing offers to customer segments across channels, such as websites, mobile, social, direct mail, call centers and email.
Tags : 
multichannel campaign management, campaign management, mccm, digital marketing
    
Adobe
Published By: Adobe     Published Date: Oct 07, 2016
Réfléchissez : c’est là que s’affichent les emails, textos, notifications push et requêtes envoyés par de nombreuses marques qui tentent de capter l’attention du client, où qu’il aille et quoi qu’il fasse. C’est donc sur cet écran d’accueil que vous avez la possibilité d’établir un véritable lien avec vos clients.
Tags : 
mobile, mobility, customer experience, customer interaction
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Am 3. Mai 1978 um 12.33 Uhr New Yorker Ortszeit verschickte Gary Thuerk eine „Massen-E-Mail“, die ihn später als „Vater des Spam“ berühmt machen sollte – aus verständlichen Gründen bevorzugt er selbst eine Würdigung als „Vater des E-Marketing“.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
In der Zeit vor Mobilgeräten, Suchmaschinenoptimierung und Facebook konnten anonyme Verbraucher kostengünstig durch Print-Medien, TV und Radio sowie Außenwerbung erreicht werden. Allerdings war es aufgrund der ungenauen Zielgruppensegmentierung schwierig, den Erfolg von Werbeaktionen zu ermitteln. Die Identifizierung potenzieller Kunden per Direkt-Mail oder Telefon war zwar messbar, aber gleichzeitig kostenintensiver und nur mit viel Aufwand skalierbar.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
On 3 May 1978, Gary Thuerk sent an e-mail that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass e-mail inviting recipients to one of two West Coast product demos for a new line of computers.
Tags : 
    
Adobe
Published By: Mimecast     Published Date: Oct 17, 2013
Macmillan Cancer Support has relied on Mimecast for robust email security backed by a 100% anti-virus and 99% antispam SLA for a number of years. Mimecast’s Email Security solution has solved a spam issue that was seriously affecting Macmillan’s email system performance and creating a significant management burden for the charity’s IT department.
Tags : 
mimecast, macmillan cancer support, email security solution, banish spam, case study, email system performance, it departments, spam problems, management and support burden, reliable email system, protected email system, safeguarding, email environment, high value activities, better email service
    
Mimecast
Published By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : 
mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact, reduce complexity, costs of managing email, email management, email infrastructure, email backup, replication cost avoidance, business continuity, legacy security solutions, productivity gains
    
Mimecast
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: Mimecast     Published Date: Oct 17, 2013
In this video, Matt Cain, Vice President and lead e-mail analyst at Gartner, outlines some of the options available to CIOs, including running hybrid e-mail environments with tried and tested services delivered from the cloud but the Exchange server remaining onsite. Matt also discusses where Office 365 currently meets the needs of enterprise customers and where third-party services should be considered to augment its functionality in key areas.
Tags : 
mimecast, cloud email, unified email management, office 365, secure email, mobile workforce, matt cain, migration services, mounil patel, email ecosystem, email infrastructure, core communication, email to cloud, customization and integration
    
Mimecast
Published By: Mimecast     Published Date: Oct 29, 2013
Don’t just store information. Use it. Mimecast makes your email archiving work harder for business advantage.
Tags : 
mimecast, email, interactive archive, email archiving, interaction platforms, email platforms, ediscovery, data loss prevention, disaster recovery, cloud computing
    
Mimecast
Published By: Smart Technologies     Published Date: Dec 11, 2015
In this whitepaper, learn how corporate culture is the key to unlocking effective collaboration. Most users are effective at driving more meetings, more emails and more interactions but the question is… are we collaborating better?
Tags : 
culture, collaboration, strategy
    
Smart Technologies
Published By: Intermedia     Published Date: Mar 01, 2016
This is a practical guide to implementing Intermedia’s Dedicated Hosted Exchange on AWS. What’s inside this guide: • A definition of Dedicated Cloud and its main benefits • Details of Intermedia’s Dedicated Exchange powered by AWS • The main benefits of the AWS platform for your business email • How can you get the cloud on your terms and not on a vendor’s terms • Steps to implement Intermedia’s Dedicated Exchange on AWS
Tags : 
    
Intermedia
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Ransomware ist eine alte Bedrohung, die jüngst ein fulminantes Comeback machte. Diese Art von Malware, deren Namen auf dem englischen Wort für Lösegeld (ransom) beruht und auf die Zahlung verweist, die nach dem dem Kidnapping der Dateien von den Opfern geleistet werden muss, entwickelte sich schnell zu einem der beliebtesten Cyberangriffe. Nahezu ein Viertel aller E-Mail-Angriffe mit schädlichen Dokumentdateien enthalten derzeit einen Ransomware-Stamm namens „Locky“.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption, email encryption
    
Voltage Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.