reputation management

Results 26 - 48 of 48Sort Results By: Published Date | Title | Company Name

Voice Search Readiness Report

Published By: Uberall     Published Date: May 13, 2019
Businesses have been told about the urgency of being ‘voice search ready’ without understanding what it means or how to accomplish it. In creating the Voice Search Readiness Report, we set out to answer one simple question - ‘are businesses voice search ready?’ and then provide a simple method for helping them to measure their own voice search readiness. We analyzed more than 73,000 SMB, mid-market and enterprise business locations in one of the largest voice search studies ever conducted to find out if businesses were taking the necessary steps to reach consumers who use voice search.
Tags : 
local marketing, location analytics, location-based marketing, location-based services, mobile marketing, real-time location systems, marketing research, geofencing, location management, local listings management, local review management, local reputation management
    
Uberall

Are You Protecting Your Business’ Online Reputation?

Published By: Main Street Hub     Published Date: May 06, 2016
Check out our definitive guide for engaging with current customers, bringing new customers your way, and making sure your online reputation shows your business in the best light.
Tags : 
local business, small business, business owner, social media for business, twitter, facebook, social media service, marketing, customer service, reputation management, online reputation, yelp, google+, business technology
    
Main Street Hub

Communicate Easily and Effectively with MediaVantage's PR Software Solutions

Published By: MediaVantage     Published Date: Feb 22, 2012
As the global leader for on-demand software for real-time reputation management, MediaVantage provides complete visibility into global reputation. It enables communicators to securely align team members, plan the synchronized delivery of messages, and engage with stakeholders through traditional and social media channels.
Tags : 
mediavantage, communications, live demo, social media, global reputation, messages
    
MediaVantage

3 Ways to Deliver Better Digital Marketing to Small Businesses

Published By: Marchex     Published Date: Nov 11, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : 
marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
    
Marchex

3 Things Small Businesses Really Need: Re-Defining the Digital Marketing Product Set

Published By: Marchex     Published Date: Oct 25, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : 
marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
    
Marchex

Business case for data protection: A Study of CEOs and other C-level Executives in the US

Published By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : 
ibm ouncelab, data protection, c-level executive us, compliance, roi, performance, privacy, data security, data protection, security management, return on investment, database security
    
IBM Software

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

Why Supply Chain Leaders Are Moving To The Cloud

Published By: Oracle     Published Date: Feb 10, 2016
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job. Today, organizations need levels of flexibility, integration, and visibility that are beyond what those systems were designed to deliver.
Tags : 
oracle, supply chain leaders, cloud migration, supply chain management, operational efficiency best practices, it management, data management
    
Oracle

Achieving Improved Network Security with IP and DNS Reputation

Published By: HP     Published Date: Jul 22, 2010
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks.
Tags : 
network security, dns, botnet command and control (cnc), malware; phishing, hp tippingpoint, tippingpoint digital vaccine, tippingpoint n-platform ips, tippingpoint security management, ips platform, access switches, reputation database, security management system, network architecture, network management, ddos, internet security, ipsec, network security appliance
    
HP

Forrester Research Reports Real ROI Results Through Device-Based Fraud

Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk, application security, auditing, internet security, network security appliance, security management, web service security
    
Iovation

The Convergence Of Reputational Risk and IT Outsourcing

Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions, best practices, enterprise resource planning, it spending, return on investment
    
IBM

What's in a Name? Plenty. The Crucial Value of Reputation Management in the Digital Age

Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube, blog, blogs, wiki, communication, control conversations, reputation management, web 2.0, media channels, collaboration, collaborative, alerts, saas
    
Visible Technologies

Six keys to effective reputational and IT risk management

Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation, security, it management, data protection, business technology
    
IBM

Six keys to effective reputational and IT risk management

Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security, it management
    
IBM

Six keys to effective reputational and IT risk management

Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value, security, it management, best practices, business intelligence
    
IBM

Keeping your cool in a crisis doesn’t have to be a nightmare. Let us show you how.

Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management
    
Brandwatch

Speed Kills - Tips for Managing Crisis in the Era of Social Media

Published By: MediaVantage     Published Date: May 03, 2011
Social media has changed the velocity of crises and how companies must manage them. It's time to speed up to keep pace. The Speed Kills whitepaper offers tips for managing crisis in the era of social media.
Tags : 
mediavantage, social media, crisis communication, public relations, reputation management, monitoring
    
MediaVantage

Insights from the 2012 Global Reputation Risk and IT Study

Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, email security, encryption, hacker detection, internet security, intrusion detection, intrusion prevention
    
IBM

Dropping Anchor - How To Secure Your Presence On The Social, Local, Mobile Web

Published By: sweetiQ     Published Date: Oct 29, 2012
Smartphones and the social, local, mobile ecosystem are the future of retail. Where once there was the yellow pages, today's mobile consumer has much more access to information. Read on to learn how to presence on the social local and mobile web.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ

Don’t Get Caught Off Guard: 10 Steps to Managing Crisis Communications

Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater

4 Key Trends in Online Reputation Management for 2017

Published By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
    
Reputation.com
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.