eMarketingPapers
Home
About Us
List Your Papers
    
> Research Library > Marketing > E-commerce > Trust and security

Add Research

Get your company's research in the hands of targeted business professionals.

Trust and security

Results 1 - 25 of 63Sort Results By: Published Date | Title | Company Name
White Paper Published By: Adobe     Published Date: May 09, 2011
C&C pros will face several challenges when mobilizing enterprise content strategies: addressing fragmented mobile device support, tailoring content delivery to device form factors, and navigating ECM vendor support options. For now, a segmented, use-case-driven approach will be the norm.
Tags : 
adobe, ecm, mobile device, c&c, enterprise content management
    
Adobe
White Paper Published By: BzzAgent     Published Date: Dec 22, 2010
Learn the truth about measuring the sales impact and ROI of social media
Tags : 
social media, measurement, roi, word of mouth, social marketing
    
BzzAgent
White Paper Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity ó giving people anywhere, anytime access to information via devices theyíre comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile
    
CDW
White Paper Published By: Click Forensics     Published Date: Jun 25, 2008
The growing problem of decrease traffic quality is making advertisers think twice about where and how they spend their advertising dollars. Learn how to keep them happy and buying in this special report from Click Forensics.
Tags : 
click forensics, traffic quality, lead generation, click quality, quality click
    
Click Forensics
White Paper Published By: Click Forensics     Published Date: Jun 25, 2008
What is click fraud?  Who is committing it?  Why should you be concerned about your paid search campaigns?  Learn how to identify if you are at risk with this special report from Click Forensics.
Tags : 
click fraud, ppc, paid search, roi, click forensics
    
Click Forensics
White Paper Published By: CPC Strategy     Published Date: Jun 26, 2012
CPC Strategy is excited to release a it's 3rd Google Shopping ebook for business owners that talks about everything you need to know to take advantage of the new Google Shopping. It's an actionable guide on how to prepare your business for the change. Fill out the form to receive CPC Strategy's Ebook.
Tags : 
google, marketing, cpc strategy, ecommerce, online shopping
    
CPC Strategy
White Paper Published By: Dyn     Published Date: Mar 27, 2014
Itís well known that transactional email is used to send out shipping notices or password resets, but did you know that due to its high click-through rates, it can be a great way to communicate with your customers? With this guide, find out what you might be missing in your transactional emails.
Tags : 
dyn, dns, email, transactional email, email security
    
Dyn
White Paper Published By: Dyn     Published Date: Feb 19, 2014
DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.
Tags : 
dyn, dns, domain name system, dns security, security
    
Dyn
White Paper Published By: Dyn     Published Date: Feb 19, 2014
The cost of security might seem steep, but compared to what youíll have to pay to mitigate a DDoS attack, itíll look like chump change. DDoS attacks donít just cost your company the annoyance of downtime, but brand reputation, customer acquisition, and of course, sales all are affected.
Tags : 
dyn, ddos, ddos attacks, security, protection
    
Dyn
White Paper Published By: Echosign     Published Date: Sep 19, 2011
Leading companies recognize the importance of eSignatures. This Buyer's Guide lets you know what to look for in an eSignature solutions vendor.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature
    
Echosign
White Paper Published By: Eloqua     Published Date: Mar 16, 2011
This whitepaper demonstrates how the fastest-growing companies are using Revenue Performance Management, or RPM, to break down silos between sales and marketing and drive explosive revenue growth.
Tags : 
benchmarking, forecasting, joe payne, lead management, lead scoring
    
Eloqua
White Paper Published By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : 
eset, smb, antivirus software, malware, it professional
    
ESET, LLC.
Webinar Published By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : 
eset, cybersecurity webinar, security manager, it security, crm solutions/software
    
ESET, LLC.
Free Offer Published By: ESET, LLC.     Published Date: Apr 19, 2011
ESET NOD32 Antivirus 4 protects your business without creating system slowdowns that negatively impact productivity. It is effective against emerging malware and Internet threats as they are released, not hours or days later. Request your free trial today.
Tags : 
eset, nod32 antivirus 4, free trial, malware, productivity
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.
White Paper Published By: Gigya     Published Date: Jun 06, 2014
This white paper will go over three ways user anonymity can negatively affect ROI for businesses and lead to poor customer experiences.
Tags : 
gigya, anonymity, user data, social networking, social networks
    
Gigya
White Paper Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information
    
Globalscape
White Paper Published By: GlobalSign     Published Date: Mar 18, 2011
Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
Tags : 
malware monitoring, ssl certificates, hosting, web hosts, isp's
    
GlobalSign
White Paper Published By: Google     Published Date: Dec 14, 2011
How Travelocity improved its digital marketing. Read the case study to see how Google Analytics Premium helped Travelocity optimize its digital investments and conversions.
Tags : 
digital marketing, digital, marketing, google analytics, metrics
    
Google
White Paper Published By: IBM     Published Date: Nov 04, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
mobility, mobile risk, security, mitigation, marketing research
    
IBM
White Paper Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminalsí continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security, emerging marketing
    
IBM
White Paper Published By: IBM     Published Date: Nov 04, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
threat prevention, cybercrime, it security, malware protection, crm solutions/software
    
IBM
White Paper Published By: Infor     Published Date: Jan 06, 2011
Taking full advantage of each customer interaction has become a strategic imperative. And customer-oriented companies in a wide range of industries must focus on developing a contact center that drives effective, consistent customer interactions and builds long-term customer loyalty. In this white paper, learn how leading organizations empower the contact center.
Tags : 
infor, customer interaction, contact center, customer loyalty, roi
    
Infor
White Paper Published By: InfusionSoft     Published Date: Apr 07, 2011
We've created "The Edge of Success" to give you the tools to grow your business the right way.
Tags : 
sales, clate mask, business success, small business owner, infusionsoft
    
InfusionSoft
White Paper Published By: Jive     Published Date: Mar 14, 2013
3 secrets behind aligning employees to company strategy
Tags : 
jive, jive software, strategic alignment, social software, traditional agencies
    
Jive
Start   Previous   1 2 3    Next    End
Search Research Library