tactics

Results 1 - 25 of 225Sort Results By: Published Date | Title | Company Name
Published By: Sitecore     Published Date: Mar 24, 2017
Getting started with personalization can seem overwhelming. We show you how with 10 easy tactics, from distinguishing between first-time web visitors and existing customers, to using real-time data to understand which calls to action will lead to conversions.
Tags : 
personalization, context marketing, digital experience, customer experience
    
Sitecore
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
"Successful talent acquisition today puts candidates front and center. To accomplish the goals of recruiting and retaining top talent, providing excellent patient care, and consolidating healthcare with partners, payers need to think cost effectively. Updating talent acquisition tactics and technologies doesn't have to be expensive, though. Take note of how Best-in-Class companies recruit, hire, onboard, and retain employees. Learn more."
Tags : 
    
Oracle HCM Cloud
Published By: Bizible     Published Date: Jun 19, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
pipeline marketing, full-funnel marketing, revenue marketing, b2b marketing, conversion tactics, growth marketing, growth hacking, demand generation
    
Bizible
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks
Published By: Ability Commerce     Published Date: May 18, 2009
Reggie Brady shares some of her favorite e-mails and explain why they're tops in her book. As you read them, think about how you might incorporate these tactics in your own e-mail programs.
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management
    
Ability Commerce
Published By: SuccessFactors     Published Date: Aug 29, 2012
Compensation managers know that, although budgets are tight, top performers still insist on being rewarded. This complimentary SuccessFactors white paper shows how you can create a strong compensation program. Download it today.
Tags : 
successfactors, sap, best practices, compensation managers, top performers, talent management strategy, reward management program, rewards program
    
SuccessFactors
Published By: eMC     Published Date: Oct 11, 2010
Learn 10 practical tips on how to make your email messages stand out among the clutter and maximize your results with this FREE white paper!
Tags : 
napco, emc, email marketing, emarketing, roi, list management, newsletter design
    
eMC
Published By: Adobe     Published Date: May 16, 2017
Chart your course with the latest trends. Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: • Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment • See how the latest trends and best practices help you acquire and engage your mobile customers • Learn how to transform your strategies around the latest mobile trends and tactics
Tags : 
    
Adobe
Published By: Memorial Hermann     Published Date: Sep 19, 2014
Health care costs are already out of control. You’ve tried everything you can think of to reduce costs, but nothing seems to work. Learn where the real problem lies and what you can do about it by rethinking your approach. • Learn why the usual tactics do little to contain costs • See how carrier choice and location impact cost • Get educated on new approaches that contain costs
Tags : 
healthcare costs, approach, carrier, choice, location, impact, educated, reliable
    
Memorial Hermann
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
    
Cisco
Published By: Lenovo     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability
    
Lenovo
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: DellEMC and Intel®     Published Date: Sep 16, 2016
This case study explores how Land Rover BAR has sharpened its competitive edge with a VxRail Appliance to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
case study, land rover, vxrail, converged infrastructure, collaboration
    
DellEMC and  Intel®
Published By: Adobe     Published Date: Nov 07, 2013
Marketers’ social media successes have added to their burdens. Many now have dozens of social pages to manage, thousands of customer comments to monitor, and hundreds of colleagues who want (or need) to participate. Social relationship platform vendors off er tools that help marketers efficiently and responsibly expand their social capabilities.
Tags : 
adobe, forrester social wave, social relationship platform, srp, significant vendors, branded social presence, social relationship, platform evaluation
    
Adobe
Published By: Teradata     Published Date: Jul 07, 2015
As cyber security challenges continue to grow, new threats are expanding exponentially and with greater sophistication—rendering conventional cyber security defense tactics insufficient. Today’s cyber threats require predictive, multifaceted strategies for analyzing and gaining powerful insights into solutions for mitigating, and putting an end to, the havoc they wreak.
Tags : 
    
Teradata
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Adobe     Published Date: Oct 30, 2014
This guide aims to help transform your email marketing strategy into a money-making machine
Tags : 
a guide to email marketing, transforming email marketing, email marketing tactics, email marketing, mobile marketing, social media marketing
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report introduces Forrester's vision of mobile marketing for marketing leaders and provides specific strategic recommendations for brands dealing with demanding mobile customers.
Tags : 
brand tactics, branding, consumer mobility, customer experience management, digital marketing, emerging methods, marketing methods, mobile apps
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
Adobe
Published By: Prophix     Published Date: May 31, 2016
To have the greatest impact within your company, you need to contribute to strategy rather than focusing on tactical issues. But, to accomplish this means that you have to tap into your company's financial performance and unearth insights that will help senior leaders make better decisions. This “From Tactics to Strategy” webinar focuses on helping you play a more critical role in your organization’s success. The fast-paced session reveals how you can capture and leverage the data gathered from across your financial systems to help senior management make better and faster strategic decisions.
Tags : 
best practices, financial performance, productivity, system management
    
Prophix
Published By: Evariant     Published Date: Sep 07, 2016
Marketers face a unique challenge to allocate resources across a variety of tactics to target key audiences that need their product or service – with limited information on what combination of products or services will have the optimum impact, which target audience members are ideal fits, and what allocations will provide the best return on investment to the organization. Healthcare has its own myriad of challenges, including many local, regional, and national options for consumers, service line variations, and disparate demographics. The good news is that there is an emerging understanding of digital and multichannel marketing, and ample opportunity to define best practices, systematically calculate marketing effectiveness and return on marketing investment (ROMI), and use technology and data to create great business outcomes.
Tags : 
evariant, multi-channel marketing, hospital, patient engagement, digital marketing
    
Evariant
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.