tactics

Results 76 - 100 of 303Sort Results By: Published Date | Title | Company Name
By: Oracle HCM Cloud     Published Date: Aug 02, 2016
Healthcare payers need to think cost effectively to accomplish the goals of recruiting and retaining top talent, providing excellent patient care and consolidating healthcare with partners. Updating talent acquisition tactics and technologies doesn't have to be expensive. Find out how Best-in-Class companies recruit, hire, on board, and retain employees.
Tags : 
     Oracle HCM Cloud
By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing
     Spredfast
By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits
     Location3
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : threats, applications, cybercriminals
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
     F5 Networks Inc
By: Sprinklr     Published Date: Jan 05, 2018
Social Advertising Techniques for Advanced Marketers is a whitepaper that explores advanced social advertising strategies, & social media marketing tactics.
Tags : social advertising, social advertising techniques, social, advertising, marketing, advertising strategies, social media, tactics
     Sprinklr
By: Dun & Bradstreet     Published Date: Nov 13, 2017
Engaging potential buyers in today’s complex and noisy B2B environment demands time, effort, and intelligence. All sellers can do is hope to guide them along their journey and influence their decisions. But even the best prospects are delaying interaction with sales and are often unresponsive to traditional marketing tactics. This is forcing organisations to use relevant, timely, and holistic data to guide interactions and communications across all channels.
Tags : data, organisations, sales, marketing, customer profiling, relationship building
     Dun & Bradstreet
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience
     Avaya
By: Brightcove     Published Date: Sep 17, 2014
OVERVIEW: THE STATE OF B2B CONTENT MARKETING IN NORTH AMERICA
Tags : content marketing, content marketing tactics, documented content strategy, b2b trends
     Brightcove
By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media
     Forrester
By: BillingPlatform     Published Date: Apr 18, 2019
Digital transformation, typically associated with front-office changes like sales and marketing, has begun to revolutionize billing practices for forward-leaning enterprises. This infographic highlights the importance of evolving your billing for the digital economy. Discover the 4 survival tactics offered by cloud-based billing platforms.
Tags : 
     BillingPlatform
By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Aug 01, 2017
Learn the inner workings of ransomware and how companies are fighting back. Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs.Download this whitepaper to learn:?The evolution of Ransomware and why businesses can’t afford to ignore it?How perpetrators tactics and targets are evolving to maximize profits?Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
     CrowdStrike
By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : deception, endpoint, network, security, protection, breach, attack, symantec
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Security teams face sophisticated attacks that ‘hide in plain sight’ and often dwell in customer environments as long as 190 days1. And attackers increasingly employ stealthy techniques to move freely within a customer environment like using stolen credentials to masquerade as legitimate users. There has been a marginal decline in zero-day discoveries and an increase in ‘living off the land’ tactics that don’t rely on the traditional combination of vulnerabilities followed by malware. These tactics are more difficult to detect since they make use of legitimate tools.
Tags : security, software, detection, network
     Symantec
By: IBM     Published Date: May 23, 2018
IBM Planning Analytics is the fast, flexible, planning solution that helps you align financial plans with corporate objectives linked to operational tactics and market events. In this quick, 10- minute guided demo, you’ll get hands-on experience with IBM Planning Analytics by building a book for revenue planning. You’ll play the role of a financial planner and learn how to: • Create a book for revenue planning in Planning Analytics Workspace • Adjust the plan by increasing sales through an online channel by 20% • Review the impact of your changes on net profit
Tags : ibm planning analytics, revenue planning, income statement
     IBM
By: IBM     Published Date: Aug 23, 2018
IBM Planning Analytics Local is the on-premises version of the planning solution built on the powerful, in-memory OLAP engine of IBM TM1. It automates your planning, budgeting and forecasting, and helps you link operational tactics with financial plans.
Tags : 
     IBM
By: IBM     Published Date: Jul 16, 2018
IBM Planning Analytics, powered by IBM TM1, is the fast, flexible, planning solution that helps you align financial plans with corporate objectives linked to operational tactics and market events. In this quick, 10- minute guided demo, you’ll get hands-on experience with IBM Planning Analytics by building a revenue plan. You’ll play the role of a financial planner and learn how to: • Create a revenue plan in IBM Planning Analytics Workspace • Adjust the plan by increasing sales by 20% through an online channel • Review the impact of your changes on net profit
Tags : 
     IBM
By: Epicor     Published Date: Apr 01, 2009
This white paper presents how to use technology systems to help your business promote corporate social responsibility.
Tags : corporate social responsibility, enterprise applications, enterprise resource planning, epicor, corporate responsibility, green it, csr, globalization
     Epicor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com