email

Results 101 - 125 of 1313Sort Results By: Published Date | Title | Company Name
Published By: Bronto     Published Date: Jul 25, 2017
Average eCommerce conversion rates range from 2 to 5%. Yet, many retailers are reluctant to automate browse recovery emails because they have these questions: How will consumers respond to emails generated from an online shopping session? Will they view the emails as intrusive? Will that increase my unsubscribe rates? Will automated browse recovery emails really get shoppers to come back and buy from my website? If you haven't started using a browse recovery strategy, or if you have but haven't seen the same ROI, you're in the right place. Here is the four-step game plan we developed based on our customers who have been the most successful in applying a browse recovery strategy.
Tags : 
browse recovery, recovery emails, online shopping, ecommerce, browse recovery strategy
    
Bronto
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : 
mobility, productivity, employee satisfaction
    
Citrix ShareFile
Published By: Bronto     Published Date: Jul 19, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their businesses to keep shoppers coming back for more. Are you ready to add a few to your toolbox? In this e-book, we'll explore seven readily available commerce marketing tools and highlight the experiences of marketers using these tools to increase revenue and engagement.
Tags : 
commerce marketing, commerce marketers, ecommerce, subsribers, manage coupons, consumer behavior, message integration, roi, customer satisfaction
    
Bronto
Published By: Marketo     Published Date: Jul 12, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : 
continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
    
Marketo
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile
Published By: Uberflip     Published Date: Jun 30, 2017
This eBook aims to provide you with an advanced understanding of content distribution in the B2B space, as well as provide an inside look at the tactics and channels (including social, organic search, email, and paid programs) you need to be leveraging to effectively distribute your content to your audience.
Tags : 
content distribution, ebook, delivery, channels, goals
    
Uberflip
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Mimecast     Published Date: Jun 15, 2017
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security, cyber attacks
    
Mimecast
Published By: Sitecore     Published Date: Jun 14, 2017
The Gartner Magic Quadrant for WCM assesses leading solutions and delivers valuable insights for those looking to optimize digital marketing platforms for a better customer experience. The 2015 report evaluates 19 vendors for their Ability to Execute as well as their Completeness of Vision. This year, Sitecore® leapt vertically to the top position for its Ability to Execute among the vendors evaluated and has been in the Leaders quadrant for six consecutive years. Learn more by downloading your copy of the 2015 Gartner Magic Quadrant for WCM now.
Tags : 
profiling, flexible deployment, marketing systems, commerce, email marketing, testing, analytics, omnichannel experience marketing, personalization, cms, wcm
    
Sitecore
Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
    
Proofpoint
Published By: Marketo     Published Date: Jun 08, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : 
continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
    
Marketo
Published By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : 
b2b integration, customer loyalty, ibm, customer growth
    
IBM
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto
Published By: Mitel     Published Date: May 18, 2017
You know the way we communicate with each other has evolved, but what about the way your business communicates with your customers? A third of the US population is made up of millennials that use multiple channels when reaching out or making a purchase, so how does this shift affect your bottom line? More importantly, how closely aligned is your customer experience strategy with how customers are buying? Looking for some clarity? Check out this infographic for a clear understanding of how customers are shopping, why they abandon your transactions, and what steps you can take to keep them happy.
Tags : 
customer experience, sms, email, web chat, social media, mobile
    
Mitel
Published By: eDataSource     Published Date: May 08, 2017
Learn how other email marketers are dealing with growing SPAM rates and driving positive ROIs for their marketing efforts.
Tags : 
edatasource, email marketing, performance insight, email delivery rates
    
eDataSource
Published By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: