mail

Results 1476 - 1500 of 1547Sort Results By: Published Date | Title | Company Name
Published By: Jive     Published Date: Apr 10, 2014
Aberdeen Group gathered data from more than 600 organizations to find out how social collaboration tools help meet business and talent goals.
Tags : 
reachmail, social collaboration, talent, employee development, business goals, talent goals, human resources
    
Jive
Published By: SilverSky     Published Date: May 22, 2014
Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.
Tags : 
silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email
    
SilverSky
Published By: Eloqua     Published Date: Sep 11, 2013
Event management and data cleansing rising more sharply than all other automated marketing practices.
Tags : 
oracle, modern marketers, modern marketers, email marketing
    
Eloqua
Published By: eFax     Published Date: Aug 06, 2013
eFax Corporate is part of publicly-traded j2 Global™ Inc. (NASDAQ: JCOM). Founded in 1995, j2 Global provides outsourced, value-added messaging and communications services to individuals and businesses around the world. The Company offers fax, voicemail and document management solutions, Web-initiated conference calling and unified-messaging and communications services.
Tags : 
efax, value-added messaging, communications services, management solutions, unified-messaging
    
eFax
Published By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
    
IBM
Published By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
email capabilities, integration, social software, business operations
    
IBM
Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: NAVEX Global     Published Date: Aug 18, 2016
A simple way companies can test their employees’ knowledge of cyber security is to create a sample phishing email to test employees’ propensity to fall for this kind of scheme.
Tags : 
    
NAVEX Global
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : 
file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express
    
Globalscape
Published By: DNN Corp.     Published Date: Mar 26, 2014
This step-by-step playbook walks you through the five most important things you must do to recruit and engage your community. In this free playbook you’ll find: • 10-point quick start checklist, • Key responsibilities for the Community Manager, • Top Tactics for recruiting and engaging community members Download this free playbook with all the essentials you need to build and manage your organizations online community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this 12-page report, loaded with charts and analysis of Forrester Research’s 2013 "B2B Social and Community Marketing Online Survey."
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this special report from LeadTail and DNN, loaded with charts and analysis of the Twitter patterns of marketing decision-makers at mid-sized companies
Tags : 
dnn, online communities, marketing communities, community management, email marketing, twitter marketing, leadtail, social web
    
DNN Corp.
Published By: DNN Corp.     Published Date: May 14, 2014
Forrester Research shares key findings from their report on branded communities in B2B marketing in this on-demand webinar. While Facebook and Twitter have failed to reach their full potential, B2B marketers are reaping the rewards of branded communities: driving lead generation and revenue, as community members influence both prospects and customers. Watch this replay as Forrester's Kim Celestre describes the tactics that B2B marketers are finding the most successful and provides a business case for creating and managing your own branded community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Castlight Health     Published Date: Feb 14, 2017
Benefits engagement is low. But employees are already overwhelmed with emails, texts, instant messages and more. Castlight Health can help to break through the noise. Their health benefits platform engages employees in their benefits, provides the right information at the right time and helps employees make better healthcare decisions.
Tags : 
    
Castlight Health
Published By: ChannelAdvisor     Published Date: May 06, 2014
A round-up of the most helpful ad extensions retailers can use to improve the reach of their Google paid search ads. In an effort to walk the fine line between helping searchers find what they need and keeping advertisers happy, Google is constantly testing, innovating and rolling out new ways to present advertisements to online shoppers.
Tags : 
reachmail, amazon errors, retailer mistakes, optimize search terms, order defect rate, negative feedback, business impact, avoiding errors, fixing errors
    
ChannelAdvisor
Published By: Adobe     Published Date: Feb 08, 2016
Download our guide, 10 New Year’s Resolutions for Email Marketers, to learn how you can transform your email campaigns in 2016.
Tags : 
adobe, marketers, email, customer relationships, mobile email
    
Adobe
Published By: Adobe     Published Date: Feb 08, 2016
These days, email is the glue that ties your customers’ identity together across channels.
Tags : 
adobe, email, marketing, strategy, roi, cross channel
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Monetate     Published Date: Aug 19, 2014
Everyone is talking about multichannel marketing as a way to reach today’s empowered customer, but what’s that mean for the email marketer? Simple: email marketers need to stop thinking about their role as a single channel focused solely on retention. This white paper will walk you through how to increase customer acquisition and retention rates by working with other members of your organization’s digital marketing team.
Tags : 
multichannel marketing, geo-targeting, customer retention, acquiring customers
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. But how do you deliver that level of revenue-driving personalization? This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.
Tags : 
subject line, geo-targeting, personalized emails, email strategies
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
If you could cut your email marketing design work in half and improve the performance of your email, would you? Of course you would. We can help you do just that. Download this case study to find how True Religion used Monetate’s open-time personalization technology to streamline its email marketing process and increase click-through rates by 10%.
Tags : 
email marketing design, personalization technology, ctr, email design templates
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
If you could cut your email marketing design work in half and improve the performance of your email, would you? Of course you would. We can help you do just that. Download this case study to find how True Religion used Monetate’s open-time personalization technology to streamline its email marketing process and increase click-through rates by 10%.
Tags : 
email marketing design, personalization technology, ctr, email design templates
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
Everyone is talking about multichannel marketing as a way to reach today’s empowered customer, but what’s that mean for the email marketer? Simple: email marketers need to stop thinking about their role as a single channel focused solely on retention. This white paper will walk you through how to increase customer acquisition and retention rates by working with other members of your organization’s digital marketing team.
Tags : 
multichannel marketing, geo-targeting, customer retention, acquiring customers
    
Monetate
Start   Previous    48 49 50 51 52 53 54 55 56 57 58 59 60 61 62    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.