awareness

Results 176 - 200 of 217Sort Results By: Published Date | Title | Company Name
Published By: Spredfast, Inc.     Published Date: Feb 03, 2014
Learn how earned, owned, and paid media can help you engage with a wider audience and increase your brand awareness.
Tags : 
earned, owned, paid, media, social media presence, social media, audience, brand awareness, brand, facebook, twitter, linkedin, business intelligence, business metrics
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
In the world of social sponsorships today the key to success is not just awareness but recognition. The path to recognition – which drives important outcomes like brand recall, consideration, and ultimately sales – requires new thinking and strategies in how to create inventive, relevant consumer experiences. Download now to learn the 5 ways to get your social brand noticed!
Tags : 
spredfast, social, social brand, sponsorship, recognition, consideration, consumer experience
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Sep 10, 2014
Designed for experienced social marketers as well as for those taking on new social roles, the Social Media Pocket Guide is a quick reference to help you stay ahead of the curve.
Tags : 
spredfast, social media, social marketing, brand awareness, social conversions, real time trends
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
In the world of social sponsorships today the key to success is not just awareness but recognition. The path to recognition – which drives important outcomes like brand recall, consideration, and ultimately sales – requires new thinking and strategies in how to create inventive, relevant consumer experiences. Download now to learn the 5 ways to get your social brand noticed!
Tags : 
spredfast, social, social brand, sponsorship, recognition, consideration, consumer experience
    
Spredfast, Inc.
Published By: SurveyMonkey     Published Date: Oct 26, 2015
Check out our latest on-demand webinar with Eventbrite’s Global Director of Metro Marketing, Eric Meyerson, to hear how Eventbrite successfully uses data to track brand awareness and monitor the competition.
Tags : 
surveymonkey, customer experience, customer care, reputation
    
SurveyMonkey
Published By: SurveyMonkey     Published Date: Jan 28, 2016
Download our 21-page sample Brand Tracking study on top shampoo brands to see the insights and analysis you could be bringing to your business.
Tags : 
surveymonkey, survey, purchase, usage, awareness, familiarity, consideration, choice, brand attribute, analysis
    
SurveyMonkey
Published By: Symantec     Published Date: Jan 10, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. This white paper is about protecting users from Firesheep and other attacks.
Tags : 
firesheep, sidejacking attacks, ssl, unprotected networks, symantec, http connections, security, data management
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : 
ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection, security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec, application security, security policies
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation
Published By: Sysomos     Published Date: Oct 24, 2012
Getting the right people excited about your brand is a powerful way to increase brand awareness and make sales. But how do attract influencers and get them talking about you? Here are 6 tips from Sysomos.
Tags : 
social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, trends, assessment, agency, marketers, business, enterprise, network, twitter, facebook, fans (24), influencers, fans, followers, evangelists
    
Sysomos
Published By: Telligent June 2013     Published Date: Jun 13, 2013
Social Marketing encompasses a slew of activity that takes place in social networks and online communities. The mashup of all this activity is a way for your brand to build better customer relationships, increase awareness of your brand and ultimately drive sales.
Tags : 
social engagement, social marketing, community marketing, social media marketing, online customer experience, social media strategy
    
Telligent June 2013
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: The Starr Conspiracy     Published Date: Jun 29, 2017
In this report, discover what’s important to learning buyers and what has changed with them since 2014.
Tags : 
sales engagement, active evaluation, brand and need awareness, sales leveraging, trade show, active evaluation
    
The Starr Conspiracy
Published By: The Starr Conspiracy     Published Date: Sep 19, 2017
It doesn’t matter if your goals involve brand awareness, functional association, or demand generation. Brands that fail to integrate an earned media strategy with paid and owned media strategies are missing key opportunities to influence the buyer’s journey. If you ignore earned media channels, you do so at the risk of missing that ideal customer. In this white paper, we’ll outline the top three reasons you need an integrated approach — that includes PR — to achieve great brand awareness
Tags : 
    
The Starr Conspiracy
Published By: TheMarketingScope     Published Date: Oct 28, 2015
Everything you need to know about marketing on LinkedIn, written both strategically, and instructionally. It’s your one-stop shop to the vast opportunities that await—increase awareness, influence perception, generate high quality leads, and ultimately drive revenue.
Tags : 
linkedin, lead generation, brand awareness, marketing strategy, sales pipeline, prospecting, lead nurturing, best practices, marketing automation, sales automation
    
TheMarketingScope
Published By: TIBCO     Published Date: Oct 28, 2013
The right integration platform lets you extract more value from your ERP system - including improved business performance, increased organizational awareness, and better coordination of processes.
Tags : 
tibco, erp, integration, value, data management
    
TIBCO
Published By: TIBCO     Published Date: Nov 11, 2013
The right integration platform lets you extract more value from your ERP system - including improved business performance, increased organizational awareness, and better coordination of processes.
Tags : 
erp, process coordination, tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy, mobile data systems
    
TIBCO
Published By: TMCnet     Published Date: May 22, 2013
What exactly does "content marketing" mean and why is it intrinsically linked to profitability? This white paper will help you answer these very questions.
Tags : 
content marketing, leveraging content, brand awareness, copy
    
TMCnet
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Turn     Published Date: Mar 09, 2016
From awareness to consideration to intent to conversion, marketers can now track campaigns at an extremely detailed level. Learn how to align the right programmatic tactics and metrics for each stage of the customer journey.
Tags : 
programmatic, omnichannel, multichannel advertising, dsp, demand side platform, omnichannel campaigns, audience definition, campaign tactics, campaign strategy, awareness, conversion
    
Turn
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Establishing a thriving business takes dedication and hard work, yet that can easily be destroyed without taking precautionary measures. To create more safety awareness, we’ve listed the top five vulnerabilities business owners face every day.
Tags : 
robbery, burglary, theft, liability, fire safety, vandalism, security, business intelligence
    
Tyco Integrated Security
Published By: Unitrends     Published Date: May 12, 2011
In this paper, we'll compare and contrast the advantages and disadvantages of each of these techniques and explain why incremental forever when combined with byte-level deduplication is the superior methodology for reducing redundant data in the most efficient manner possible.
Tags : 
unitrends, redundant data, backup solution, data deduplication, olsen twins, mark kate olsen, ashley olsen, content awareness, file-level, block-level, byte-level, incremental forever, backup and recovery, storage management, application integration, data protection
    
Unitrends
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.