mail

Results 1576 - 1600 of 1651Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking, security
    
Cisco
Published By: NAVEX Global     Published Date: Aug 18, 2016
A simple way companies can test their employees’ knowledge of cyber security is to create a sample phishing email to test employees’ propensity to fall for this kind of scheme.
Tags : 
    
NAVEX Global
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, security, it management, data management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : 
file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, it management
    
Globalscape
Published By: DNN Corp.     Published Date: Mar 26, 2014
This step-by-step playbook walks you through the five most important things you must do to recruit and engage your community. In this free playbook you’ll find: • 10-point quick start checklist, • Key responsibilities for the Community Manager, • Top Tactics for recruiting and engaging community members Download this free playbook with all the essentials you need to build and manage your organizations online community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this 12-page report, loaded with charts and analysis of Forrester Research’s 2013 "B2B Social and Community Marketing Online Survey."
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this special report from LeadTail and DNN, loaded with charts and analysis of the Twitter patterns of marketing decision-makers at mid-sized companies
Tags : 
dnn, online communities, marketing communities, community management, email marketing, twitter marketing, leadtail, social web
    
DNN Corp.
Published By: DNN Corp.     Published Date: May 14, 2014
Forrester Research shares key findings from their report on branded communities in B2B marketing in this on-demand webinar. While Facebook and Twitter have failed to reach their full potential, B2B marketers are reaping the rewards of branded communities: driving lead generation and revenue, as community members influence both prospects and customers. Watch this replay as Forrester's Kim Celestre describes the tactics that B2B marketers are finding the most successful and provides a business case for creating and managing your own branded community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Castlight Health     Published Date: Feb 14, 2017
Benefits engagement is low. But employees are already overwhelmed with emails, texts, instant messages and more. Castlight Health can help to break through the noise. Their health benefits platform engages employees in their benefits, provides the right information at the right time and helps employees make better healthcare decisions.
Tags : 
    
Castlight Health
Published By: ChannelAdvisor     Published Date: May 06, 2014
A round-up of the most helpful ad extensions retailers can use to improve the reach of their Google paid search ads. In an effort to walk the fine line between helping searchers find what they need and keeping advertisers happy, Google is constantly testing, innovating and rolling out new ways to present advertisements to online shoppers.
Tags : 
reachmail, amazon errors, retailer mistakes, optimize search terms, order defect rate, negative feedback, business impact, avoiding errors, fixing errors, enterprise applications
    
ChannelAdvisor
Published By: Adobe     Published Date: Feb 08, 2016
Download our guide, 10 New Year’s Resolutions for Email Marketers, to learn how you can transform your email campaigns in 2016.
Tags : 
adobe, marketers, email, customer relationships, mobile email, enterprise applications, business technology
    
Adobe
Published By: Adobe     Published Date: Feb 08, 2016
These days, email is the glue that ties your customers’ identity together across channels.
Tags : 
adobe, email, marketing, strategy, roi, cross channel, enterprise applications, business technology
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Monetate     Published Date: Aug 19, 2014
Everyone is talking about multichannel marketing as a way to reach today’s empowered customer, but what’s that mean for the email marketer? Simple: email marketers need to stop thinking about their role as a single channel focused solely on retention. This white paper will walk you through how to increase customer acquisition and retention rates by working with other members of your organization’s digital marketing team.
Tags : 
multichannel marketing, geo-targeting, customer retention, acquiring customers
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. But how do you deliver that level of revenue-driving personalization? This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.
Tags : 
subject line, geo-targeting, personalized emails, email strategies
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
If you could cut your email marketing design work in half and improve the performance of your email, would you? Of course you would. We can help you do just that. Download this case study to find how True Religion used Monetate’s open-time personalization technology to streamline its email marketing process and increase click-through rates by 10%.
Tags : 
email marketing design, personalization technology, ctr, email design templates
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
If you could cut your email marketing design work in half and improve the performance of your email, would you? Of course you would. We can help you do just that. Download this case study to find how True Religion used Monetate’s open-time personalization technology to streamline its email marketing process and increase click-through rates by 10%.
Tags : 
email marketing design, personalization technology, ctr, email design templates
    
Monetate
Published By: Monetate     Published Date: Aug 19, 2014
Everyone is talking about multichannel marketing as a way to reach today’s empowered customer, but what’s that mean for the email marketer? Simple: email marketers need to stop thinking about their role as a single channel focused solely on retention. This white paper will walk you through how to increase customer acquisition and retention rates by working with other members of your organization’s digital marketing team.
Tags : 
multichannel marketing, geo-targeting, customer retention, acquiring customers
    
Monetate
Published By: Oracle     Published Date: Sep 05, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World"
Tags : 
digital, body language, sales, responses, transactions, b2b, body language, downloads, engagement, business, climate, product, solution
    
Oracle
Published By: PostUp     Published Date: Sep 25, 2014
Learn about the best practices regarding mobile email design and see what process your organization should be following in order to decide between a responsive or scaleable design.
Tags : 
postup, mobile responsive, mobile email, email marketing best practices, design mobile, designing for mobile, mobile email design
    
PostUp
Published By: PostUp     Published Date: Sep 25, 2014
Learn how to create an inspiring and exciting email program and see how 13 of the top industry B2C leaders have structured their campaigns.
Tags : 
postup, email creative, creative newsletter design, creative newsletter, creative email newsletters, email marketing solutions, email campaign, email marketing program, email marketing best practices
    
PostUp
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : 
data security, byod, corporate security, mobile data security, user experience, security, it management, data management
    
IBM MaaS360
Published By: eDataSource     Published Date: Apr 13, 2015
Looking to improve your email campaigns? Now you can with 3 remarkable email tools. Competitive Tracker - email data & creative on what your direct competitors are doing. Design Tracker, powered by Litmus - pre test the campaign before you hit send button. Inbox-tracker - know in real-time your inbox delivery. Learn more by downloading our quick overview white paper.
Tags : 
edatasource, email tools, email data, competitive tracker, design tracker, inbox-tracker
    
eDataSource
Published By: eDataSource     Published Date: May 05, 2015
Looking to improve your email performance? Over 100 emailers achieved a 40 open rate for Mothers Day alone - Learn more...
Tags : 
edatasource, email tools, email performance, email subject line, real-time data, email competitive intelligence
    
eDataSource
Start   Previous    53 54 55 56 57 58 59 60 61 62 63 64 65 66 67    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.