email

Results 226 - 250 of 1322Sort Results By: Published Date | Title | Company Name
Published By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : 
e-mail security, guide, clearswift, clearswift
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management
    
Clearswift
Published By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: • How effectively brands are using customer data to nudge them back onto the purchase path. • How triggered messages can better engage customers and keep them coming back. • How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : 
revenue, email, internet, retailer, website
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
trends, ecommerce, marketing, strategy
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: How flexibility in choosing the number and time to send emails can increase engagement. What to look for in the segmentation and personalization of cart recovery emails. How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, customer, consumer, revenue, recovery
    
Bronto
Published By: Bronto     Published Date: Jun 01, 2018
xxx
Tags : 
    
Bronto
Published By: SAS     Published Date: Apr 16, 2015
Few advances in technology have impacted how we do business as broadly and profoundly as mobile. Mobile devices are creating new opportunities for organizations to engage with their customers, but the bigger reasons to focus on mobile relate to how mobile is changing how people behave. For marketers, the opportunities lie beyond the simple lure of mobile as just another channel to engage with customers. Because mobile devices are highly valued and always present, they bring a unique complexity that is not associated with email, digital or other channels of engagement.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 21, 2015
Because mobile devices are highly valued and always present, they bring a unique complexity that is not associated with email, digital or other channels of engagement.
Tags : 
    
SAS
Published By: GFI Software     Published Date: May 17, 2012
Download your FREE 30-Day Trial of GFI MailEssentials Today! GFI MailEssentials 2012 is an all-new version which enhances the anti-spam functionality and integrates email security functionality to provide one comprehensive on-premise email solution.
Tags : 
gfi software, mailessentials, mailarchiver, 64 bit, free trial, exchange, server email archiving, compliance
    
GFI Software
Published By: Splunk     Published Date: Sep 17, 2012
Splunk has become a critical real-time monitoring and analytics tool for Bronto. Read more about Bronto Software's hard and soft ROI's by using Splunk versus extending their Hadoop deployment.
Tags : 
roi, enterprise management associates, real time monitoring, analytics, hadoop, email delivery system, enterprise business solutions
    
Splunk
Published By: WatchGuard     Published Date: Oct 16, 2012
Email makes communication simple. Unencrypted email messages are sent in clear text or some other easily readable format regardless of the email program used. Read this white paper to learn more about how interoperability makes email vulnerable.
Tags : 
watchguard, email encryption, security, data management, internet security
    
WatchGuard
Published By: Yapmo     Published Date: Mar 26, 2013
Learn how @Properties achieved major growth in efficiency and sales by cleaning up their email environment.
Tags : 
email, email management, collaboration, adoption
    
Yapmo
Published By: Yapmo     Published Date: Mar 26, 2013
The average employee spends about 650 hours a year on email.
Tags : 
email, email management, collaboration, adoption
    
Yapmo
Published By: Yapmo     Published Date: Mar 26, 2013
Yapmo has taken The Walsh Group from having ideas bottled up in various regions to having free flowing approach where people can collaborate on suggestions throughout the company.
Tags : 
email, email management, collaboration, adoption, ideation, innovation
    
Yapmo
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: OpenText GXS     Published Date: Apr 21, 2014
How many paper invoices do you receive every year? How many invoices come attached to emails as PDFs? What if every invoice you received came directly into your accounts payable application with all the information you need to process it. Sounds like a dream, but we can help you make it a reality. Watch this video to learn more!
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: Teradata     Published Date: Feb 04, 2015
The Enterprise Priorities in Digital Marketing report, produced by Econsultancy in partnership with Teradata, provides guidance for the future through specific benchmarks from digital marketing leaders at enterprise organizations. The report focuses on the technology priorities of the world's largest companies, the strategies they support and the marketing budgets with which they're aligned. The report is based on an international survey of 402 senior marketers (director and above) from global enterprises. Respondents were from companies with more than $500 million in revenue, with 56% having revenues over $3 billion.
Tags : 
teradata, marketing, strategic direction, attribution, cloud, application, audience, management, conversion, data, platform, social, tag, content, email, technology, digital, retention, media, measurement
    
Teradata
Published By: Teradata     Published Date: Feb 04, 2015
Digital marketing campaigns provide quantifiable results like nothing ever before, and the multi-channel world is certainly the biggest opportunity to hit marketing strategies in decades. But how can sophisticated brand marketers keep pace with everything new in digital marketing? Where will it take us next? And how can marketing leaders use digital channels to edge out competitors? Read this white paper to learn the benefits of personalization to digital marketing, how to make your digital marketing practices future focused, and how responsive email design can increase open rates and reduce subscriber opt-outs.
Tags : 
teradata, digital, marketing, brand, engagement, personalization, experience, performance, revenue, conversion, acquisition, data, future, email, content, social, search, display, mobile, paid
    
Teradata
Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling, email security strategy
    
Mimecast
Published By: Mimecast     Published Date: Aug 30, 2016
Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
mimecast, email, cloud, email archiving, email
    
Mimecast
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Gild     Published Date: Jun 10, 2015
Increase response rates, build relationships, and restore trust with candidates.
Tags : 
mass communications, recruiting email, candidates, response rates, relationship building, restore trust
    
Gild
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: