mail

Results 1 - 25 of 1492Sort Results By: Published Date | Title | Company Name
Published By: Oracle OMC     Published Date: Jul 16, 2018
In marketing, you’ve got to be able to pivot. Why? People are unpredictable. They delete emails you thought they’d open, ignore offers you thought they’d use, and add items to their carts before leaving them behind. Move faster and stay relevant with true multichannel fluidity.
Tags : 
customer, experience, email, multichannel
    
Oracle OMC
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
When you’re tasked with filling numerous open requisitions, you’ll typically source and engage candidates using the same traditional methods you’ve always used: you’ll post a job requisition online, wait for the flood of resumes to come in, then over-rely on tracking candidates via spreadsheets and emails. This isn't a winning strategy and it actually makes the recruiting process longer, more expensive, and less effective for building a powerhouse workforce.
Tags : 
talent, acquisition, strategy, workforce
    
Cornerstone OnDemand
Published By: Mimecast     Published Date: Jun 28, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Mimecast     Published Date: Jun 28, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Monetate     Published Date: Jun 27, 2018
Delivering personalized experiences at scale is a challenge the travel and hospitality industry would be well advised to take on. While segmentation can work to a point, truly 1:1 experiences are the key to more conversions. This case-study brief shows how eight companies, including one in the luxury travel space, used personalization to make an impact. In the case-studies you’ll learn: • What one luxury travel company did to achieve a +33.5% lift in email sign up traffic. • How a leading apparel company saw a 73.9% lift to email sign ups without offering a discount • How a retailer achieved a 3.3% reduction in homepage bounce rate with a customized carousel. • What 5 more companies did to achieve equally impressive results from their personalization efforts.
Tags : 
    
Monetate
Published By: Epson     Published Date: Jun 22, 2018
Businesses like yours rely on e ective internal and external connections between employees to operate e ciently. But you might be discovering that the old ways of conveying important business messages are no longer enough for your sta . Relying only on telephone calls, email, and face-to-face meetings alone could be now considered a competitive disadvantage. It also makes it more di cult to attract top talent, and inhibits the communication speed most enterprises now require.
Tags : 
    
Epson
Published By: Bluecore     Published Date: Jun 21, 2018
If you’re like most email marketers, you do a lot of “hurry up and wait.” Download now to learn more about a solution from Bluecore.
Tags : 
    
Bluecore
Published By: Bluecore     Published Date: Jun 21, 2018
Learn how Bluecore helped Discount School Supply with their eCommerce Marketing.
Tags : 
    
Bluecore
Published By: Jebbit     Published Date: Jun 12, 2018
In the retail and eCommerce world, data can be your differentiator...or your downfall. To stand out, marketers are increasingly turning to first-party declared data to fuel their strategies. Learn how retailers are using mobile attention to collect and activate declared data for: Qualified lead acquisition and direct response Relevant remarketing with custom audiences and retargeting 1-to-1 email personalization Audience building and profiling
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Bronto     Published Date: Jun 01, 2018
xxx
Tags : 
    
Bronto
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: • How effectively brands are using customer data to nudge them back onto the purchase path. • How triggered messages can better engage customers and keep them coming back. • How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : 
revenue, email, internet, retailer, website
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
trends, ecommerce, marketing, strategy
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
Did you know that only one in five emails actually make it to the inbox? Where do yours end up? Deliverability can make or break your email marketing program. Yet, many marketers don’t fully understand it. We’ll show you how to create a program that beats the odds. What you'll learn: • The factors that affect deliverability. • How deliverability is calculated. • The steps you can take to improve it.
Tags : 
email, marketers, programs, technology
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: How flexibility in choosing the number and time to send emails can increase engagement. What to look for in the segmentation and personalization of cart recovery emails. How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, customer, consumer, revenue, recovery
    
Bronto
Published By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
    
Mimecast
Published By: Amazon Web Services     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
Amazon Web Services
Published By: Kronos     Published Date: May 30, 2018
In this article, learn the implications for companies when they don’t have reliable payroll processes that deliver accurate paychecks and what companies can do to rectify this issue: •Paycheck errors can negatively impact employee engagement •Nearly half of U.S. employees will look for a new job after having two problems with their paycheck •An automated payroll solution enables managers to review employee time daily and manage by exception, increasing payroll accuracy and saving manager and payroll staff time •Email alerts and a robust workflow can identify payroll issues before they become trends Download this informative article to learn more about the impact of payroll errors and the advantages of using an automated Kronos® workforce management solution to create perfect paychecks.
Tags : 
    
Kronos
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.