Skip to main content
 

response

Results 351 - 375 of 545Sort Results By: Published Date | Title | Company Name
Published By: Act-On     Published Date: Nov 12, 2008
Discover how to get maximum response from your next e-mail Webinar invitation. Learn how to make your event stand out from the crowd, and how to avoid the common mistakes that doom most Webinars to mediocrity.
Tags : 
act-on, webinars, marketing, campaigns, marketing automation, lead generation, lead management, email, webforms, webex.
    
Act-On
Published By: Genius Inc     Published Date: Apr 28, 2010
This event will give you what you need to: •Evaluate your social media needs •Set the ground rules for your organization •Establish Goals •Match response and engagement to buyer interest •Measure Success •Get started and be successful with Social Marketing
Tags : 
genius, webinar, social marketing, social media, networking, response, engagement, sales, buyer interest
    
Genius Inc
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Sephora is a leading retail beauty chain selling more than 8,000 unique products and 250 brands of perfume and premium cosmetics.  A fully owned subsidiary of the world’s leading luxury products company, LVMH Moët Hennessy Louis Vuitton, Sephora operates 500+ stores in 14 countries worldwide, with an expanding base of more than 125 stores across North America where it is the largest retailer of perfume and cosmetics.
Tags : 
neolane, sephora, direct mail campaigns, increase response rates, reduce campaign analysis time, spss integration, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: Bazaarvoice     Published Date: Aug 01, 2014
Negative consumer feedback creates great opportunities for brands to respond. In fact, consumers who read helpful brand responses to reviews are 186% more likely to make a purchase. Hear first-hand how brands respond in this recording.
Tags : 
bazaarvoice, marketing, reviews, purchase intent, brand, feedback, marketing research, traditional marketing
    
Bazaarvoice
Published By: SAS     Published Date: Mar 14, 2014
Fan loyalty is everything in the sports business. So when Major League Soccer (MLS), the top flight pro soccer league in the US and Canada, wanted to deepen customer engagement, it turned to SAS® Marketing Automation to get a better understanding of its fans.
Tags : 
sas, customer engagement, data acquisition, monetization, measurement and tracking, mls, major league soccer, database, marketing automation, internal sources, fan funnel, personalization for fans, marketing campaigns, behavior-targeted, geotargeted offers, response data, engagement
    
SAS
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Black’s partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection, detection, response capabilities
    
CarbonBlack
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s advanced attackers are using to break into your organization and why you require a defense-in-depth cyber security program that incorporates automatic detection and incident response.
Tags : 
carbon black, cyber attacks, cyber security, attacks, security, advanced attacks, detection
    
CarbonBlack
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response
    
CarbonBlack
Published By: Port25 Solutions     Published Date: Mar 23, 2012
As the chief crisis management solution nationwide, it is essential that eAlert utilizes a delivery system with maximum reliability, delivery performance, and reporting features to meet its clients' demands - PowerMTA was the only SMTP software flexible enough to supply these necessary features and easily integrate into eAlert's current system without interruption.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Skillsoft     Published Date: Nov 21, 2013
Learning is critical to enabling business strategy, from onboarding new hires to developing future leaders, to educating channel partners and customers. This study, based on responses collected from 185 organizations between July and September 2013, looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs. Research conducted by Aberdeen Group and brought to you thanks to Skillsoft.
Tags : 
career advancement, learning, training, certification, onboarding, employee development, human capital management, learning, employee performance
    
Skillsoft
Published By: beep! Directed Voicemail     Published Date: Mar 12, 2013
Download this white paper to learn about the insights from B2B sales experts on how to properly use voice mail to drive more response.
Tags : 
voicemail, beep!, sales strategy, crm, customer relationship management, calling center strategy, sales
    
beep! Directed Voicemail
Published By: IBM     Published Date: Mar 28, 2013
Find out how organizations can use social approaches to create meaningful business value. This report is based on responses from more than 1,100 individuals and interviews with more than two dozen executives from leading organizations.
Tags : 
social business, business, organizations, social media, workforce productivity, ibm, business value, search marketing, email marketing, website development, emerging marketing, advertising agencies, internet marketing, crm & customer care, marketing research, e-commerce, traditional marketing, sales
    
IBM
Published By: IBM     Published Date: Nov 08, 2013
IBM SPSS Statistics helps Assess Systems improve its candidate assessment instruments
Tags : 
ibm, uncovering assessment response, assess systems, evaluate assessment data, ibm spss statistics, job performance, test development, test research, company fit, candidate to employee, solution components, business analytics
    
IBM
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: Cisco     Published Date: Sep 07, 2016
This white paper goes into detail about continuous endpoint threat detection and response in a point-in-time world.
Tags : 
    
Cisco
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : 
security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection, advanced threats, prevention, detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident, monitoring, remediation
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This report examines organizations’ security strategies, cyber-attack environments, IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills and poor security analytics capabilities.
Tags : 
siem, esg, jon oltsik, golden hour, attack detection and incident response
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : 
siem, incident response, sans, continuous monitoring
    
Intel Security
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.