email

Results 301 - 325 of 1366Sort Results By: Published Date | Title | Company Name
Published By: Concep     Published Date: Mar 26, 2007
It's a long-debated question: is email marketing an art or a science? The answer may surprise you.  Download this paper now to learn more.
Tags : 
email marketing, enewsletters, enewsletter, newsletter design, deliverability, database and list managers, concep
    
Concep
Published By: Concur     Published Date: Aug 15, 2017
At Concur, we receive a lot of questions about the best way to audit expense claims. Often the approaches to audit vary greatly by industry and company culture. It doesn’t have to be confusing. In this report, we hope to provide a clear perspective that can help every business identify ways to improve their audit process.
Tags : 
reporting, configuration, auditing, email reminders, data, communication, concur, maxus
    
Concur
Published By: Concur ENT     Published Date: Nov 07, 2017
Concur’s Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : 
auditing, configuration, reporting, data, email reminders, communication, concur
    
Concur ENT
Published By: Connectus     Published Date: Aug 21, 2009
Long ago dubbed the 'killer app', email marketing has now reached the height of its potential and is poised to assume its place as the medium of choice for maintaining customer relationships. In fact, despite the threat of spam, marketers are continuing to turn to email marketing initiatives - with impressive results. Email marketing continues to be the most affordable, efficient and personalized way to connect with clients and future prospects.
Tags : 
crm, customer relationship management, customer relationship lifecycle, email marketing, customer loyalty, loyalty and retention, loyalty, retention, customer communication, ebusiness, e-business, connectus
    
Connectus
Published By: Connectus     Published Date: Aug 21, 2009
This paper discusses both the benefits and the pitfalls of the increased focus on marketing measurement, and describes how a comprehensive Marketing Intelligence strategy can be used to report on the full spectrum of marketing activities.
Tags : 
marketing, email marketing, business intelligence, business analytics, analytics, analytical applications, marketing intelligence, direct response, connectus
    
Connectus
Published By: Constant Contact     Published Date: Oct 23, 2014
Email marketing has proven to be a successful way to drive revenue and stay top-of-mind. In this paper we explore why you should outsource your email marketing and how to go about finding the right provider.
Tags : 
constant contact, email service, diy, small business, marketing solutions, saas, email marketing, emerging marketing
    
Constant Contact
Published By: Constant Contact     Published Date: Apr 02, 2015
With over 600,000 customers, Constant Contact has seen what works for small businesses. In this guide, we’ll show you 10 proven ways email marketing can help you do more business. We’ll show you why smart small businesses use email marketing to drive repeat business and word-of-mouth referrals. Whether you plan on doing email marketing yourself or having someone do it for you, you’ll be set up for success.
Tags : 
constant contact, email marketing, email marketing strategy, customer retention, customer engagement, emerging marketing, marketing research
    
Constant Contact
Published By: Constant Contact     Published Date: Apr 02, 2015
With over 600,000 customers, Constant Contact has seen what works for small businesses. In this guide, we’ll show you 10 proven ways email marketing can help you do more business. We’ll show you why smart small businesses use email marketing to drive repeat business and word-of-mouth referrals. We also have the tools you need to do email marketing effectively and stay compliant with legislations like the Canadian Anti-Spam Legislation (CASL). Whether you plan on doing email marketing yourself or having someone do it for you, you’ll be set up for success.
Tags : 
constant contact, email marketing, email marketing strategy, customer retention, customer engagement, emerging marketing, marketing research
    
Constant Contact
Published By: Constant Contact     Published Date: Jun 18, 2015
Email marketing is a proven and cost-effective way to drive revenue and stay top-of-mind with prospects and customers. But many small business owners struggle to find the time to get started with email marketing or see real results. In this paper, find out how an email marketing consultant can solve this problem, see how one small business quadrupled its return on investment by working with an email marketing consultant, and how to find a local and vetted email marketing consultant within 72 hours.
Tags : 
constant contact, email marketing, email marketing strategy, marketing email, emerging marketing, internet marketing, crm & customer care
    
Constant Contact
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: Conversica     Published Date: Nov 10, 2015
In this whitepaper you will learn how artificial intelligence can automatically interpret and respond to emails from leads.
Tags : 
conversica, sales leads, leads, lead nurturing, intelligence
    
Conversica
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
When you’re tasked with filling numerous open requisitions, you’ll typically source and engage candidates using the same traditional methods you’ve always used: you’ll post a job requisition online, wait for the flood of resumes to come in, then over-rely on tracking candidates via spreadsheets and emails. This isn't a winning strategy and it actually makes the recruiting process longer, more expensive, and less effective for building a powerhouse workforce.
Tags : 
talent, acquisition, strategy, workforce
    
Cornerstone OnDemand
Published By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
Published By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Data Services     Published Date: Apr 10, 2011
A complete overview of Extensior customized list services for any business marketing needs
Tags : 
data services, list services, emailing lists, email append, data cleaning, list cleaning, list append, b2b lists, email list
    
Data Services
Published By: DATAbuddy     Published Date: Apr 27, 2009
Thousands of companies already leveraged the power of email marketing to promote their business to a wide range of customers. For those businesses that haven't yet introduced email marketing into their advertising efforts - and even for some of those who have - the strategy does reveal some challenges. Companies struggling to get the most out of their email marketing efforts should consider using a managed email marketing service. Let's take a look at the challenges of email marketing and how an outside firm can tackle those issues.
Tags : 
databuddy, email marketing, e-mail, email, email campaign, outside agency, smb, small business, medium business, smb, design and editorial, html coding, browser, paperless marketing, templates, click-thrus, deliverability, spam, website integration, consistent deployment
    
DATAbuddy
Published By: Datalink     Published Date: Aug 21, 2009
Read this white paper to learn how email storage management and email archiving technologies can help optimize resources and reduce risk and cost for your company.
Tags : 
email archiving, content management, cms, content management system, email archive, email storage, email inbox, datalink
    
Datalink
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption
    
DataMotion
Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance
    
DataMotion
Published By: DataMotion     Published Date: Jan 06, 2011
Get a better understanding of the value to your organization of securing email with encryption. Read Educating Decision Makers About the Need for Encryption, a whitepaper by Osterman Research
Tags : 
secure email, encryption, private email
    
DataMotion
Published By: Datastax     Published Date: Nov 07, 2017
Regular customer experience solutions just segment and stereotype their customers and perform in a sort of action-reaction, request-response manner, rather than being instantly responsive. Being responsive means adjusting to each additional interaction and observed behavior, and making every action, every click, every scroll, every email, every second spent on your app part of a larger conversation. You need to have the systems in place that can effectively engage a customer in that conversation and not just analyze it with historical data or after the fact.
Tags : 
    
Datastax
Published By: DataViz     Published Date: Feb 06, 2007
Push email is in high demand for today's mobile workforce. If you have Documents To Go with InTact Technology, you can edit your files from anywhere without compromise.  Check out this white paper to find out how.
Tags : 
mobile computing, mobile workers, wireless application software, microsoft office, mobility, dataviz, document management, dataviz intact, intact technology, documents to go
    
DataViz
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: