tactics

Results 1 - 25 of 215Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 03, 2017
Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: o Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment o See how the latest trends and best practices help you acquire and engage your mobile customers o Learn how to transform your strategies around the latest mobile trends and tactics Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: o Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment o See how the latest trends and best practices help you acquire and engage your mobile customers o Learn how to transform your strategies around the latest mobile trends and tactics
Tags : 
mobile maturity, digital experience, mobile marketing investment, mobile strategy, marketing, mobile marketing
    
Adobe
Published By: Ability Commerce     Published Date: May 18, 2009
Reggie Brady shares some of her favorite e-mails and explain why they're tops in her book. As you read them, think about how you might incorporate these tactics in your own e-mail programs.
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management
    
Ability Commerce
Published By: SuccessFactors     Published Date: Aug 29, 2012
Compensation managers know that, although budgets are tight, top performers still insist on being rewarded. This complimentary SuccessFactors white paper shows how you can create a strong compensation program. Download it today.
Tags : 
successfactors, sap, best practices, compensation managers, top performers, talent management strategy, reward management program, rewards program
    
SuccessFactors
Published By: eMC     Published Date: Oct 11, 2010
Learn 10 practical tips on how to make your email messages stand out among the clutter and maximize your results with this FREE white paper!
Tags : 
napco, emc, email marketing, emarketing, roi, list management, newsletter design
    
eMC
Published By: Memorial Hermann     Published Date: Sep 19, 2014
Health care costs are already out of control. You’ve tried everything you can think of to reduce costs, but nothing seems to work. Learn where the real problem lies and what you can do about it by rethinking your approach. • Learn why the usual tactics do little to contain costs • See how carrier choice and location impact cost • Get educated on new approaches that contain costs
Tags : 
healthcare costs, approach, carrier, choice, location, impact, educated, reliable
    
Memorial Hermann
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: Dell     Published Date: Sep 16, 2016
This case study explores how Land Rover BAR has sharpened its competitive edge with a VxRail Appliance to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
case study, land rover, vxrail, converged infrastructure, collaboration
    
Dell
Published By: Adobe     Published Date: Nov 07, 2013
Marketers’ social media successes have added to their burdens. Many now have dozens of social pages to manage, thousands of customer comments to monitor, and hundreds of colleagues who want (or need) to participate. Social relationship platform vendors off er tools that help marketers efficiently and responsibly expand their social capabilities.
Tags : 
adobe, forrester social wave, social relationship platform, srp, significant vendors, branded social presence, social relationship, platform evaluation
    
Adobe
Published By: Teradata     Published Date: Jul 07, 2015
As cyber security challenges continue to grow, new threats are expanding exponentially and with greater sophistication—rendering conventional cyber security defense tactics insufficient. Today’s cyber threats require predictive, multifaceted strategies for analyzing and gaining powerful insights into solutions for mitigating, and putting an end to, the havoc they wreak.
Tags : 
    
Teradata
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Adobe     Published Date: Oct 30, 2014
This guide aims to help transform your email marketing strategy into a money-making machine
Tags : 
a guide to email marketing, transforming email marketing, email marketing tactics, email marketing, mobile marketing, social media marketing
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report introduces Forrester's vision of mobile marketing for marketing leaders and provides specific strategic recommendations for brands dealing with demanding mobile customers.
Tags : 
brand tactics, branding, consumer mobility, customer experience management, digital marketing, emerging methods, marketing methods, mobile apps
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
Adobe
Published By: Prophix     Published Date: May 31, 2016
To have the greatest impact within your company, you need to contribute to strategy rather than focusing on tactical issues. But, to accomplish this means that you have to tap into your company's financial performance and unearth insights that will help senior leaders make better decisions. This “From Tactics to Strategy” webinar focuses on helping you play a more critical role in your organization’s success. The fast-paced session reveals how you can capture and leverage the data gathered from across your financial systems to help senior management make better and faster strategic decisions.
Tags : 
best practices, financial performance, productivity, system management
    
Prophix
Published By: Evariant     Published Date: Sep 07, 2016
Marketers face a unique challenge to allocate resources across a variety of tactics to target key audiences that need their product or service – with limited information on what combination of products or services will have the optimum impact, which target audience members are ideal fits, and what allocations will provide the best return on investment to the organization. Healthcare has its own myriad of challenges, including many local, regional, and national options for consumers, service line variations, and disparate demographics. The good news is that there is an emerging understanding of digital and multichannel marketing, and ample opportunity to define best practices, systematically calculate marketing effectiveness and return on marketing investment (ROMI), and use technology and data to create great business outcomes.
Tags : 
evariant, multi-channel marketing, hospital, patient engagement, digital marketing
    
Evariant
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Cielo     Published Date: Jul 11, 2016
Talent acquisition has changed, and it grows more complex by the day. As the world of employment evolves, so do the tools, tactics and strategies to locate the best talent. To master it all and find the right people for your organization, you need the help of dedicated talent acquisition professionals.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring
    
Cielo
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity, ddos, analytics, networking
    
Akamai Technologies
Published By: Movable Ink     Published Date: Oct 04, 2016
Financial Times showcased user-generated content with a live social feed in their emails. Check out our new eBook here and learn how contextual marketing can benefit your company with our top tips and tactics.
Tags : 
contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, finance, internet marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
Want to get better results with email? Grab our Email Marketing Guide for Financial Services. Gain insight on email campaigns, content strategies and tactics used by successful brands, plus advice from our team of experts.
Tags : 
contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, finance, internet marketing
    
Movable Ink
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.