social reach

Results 1 - 25 of 63Sort Results By: Published Date | Title | Company Name

11 Tips for Pitching Reporters on Social Media

Published By: Cision     Published Date: May 02, 2016
How can you boost the odds your social media pitches will drive success? These 11 tips will help. You’ll not only pitch well but also build solid media relations and outreach programs.
Tags : 
cision, social media, reporters, social journalism, marketing, social strategy
    
Cision

2015 Top 10 BC/DR Trends

Published By: xMatters     Published Date: Feb 04, 2015
Staying on top of cutting-edge communication trends can be the difference in saving lives during a disaster or even preserving customer loyalty by notifying people during a major business interruption. Get the complimentary report written by industry expert Dr. Steven B. Goldman and learn the important trends you need to be aware of in 2015, including: • The increase in security budgets, as well as fines and lawsuits • The continuing rise in data breaches and malicious cyber attacks • The impact of social media on crisis preparations and response • Why natural disasters may be the least of your worries • And most importantly, how to survive the robot uprising!
Tags : 
security, budgets, disaster, business interruption, social media, data breaches, customer loyalty, communication trends
    
xMatters

5 Keys to Creating Awesome Social Content

Published By: Tapinfluence     Published Date: Jun 07, 2016
Consumers are hungry for social content that speaks to their unique needs, but they seldom turn to brands to get it. In order to satisfy this need, you have to reach consumers where they already are with content that adds value beyond what any of your products can offer. This eBook will guide you through the process of creating optimized content for social campaigns, including recipes, styled photo collections, instructional videos, product reviews, and more.
Tags : 
content management, content delivery, best practices, performance management, reach, social content, business intelligence, business management
    
Tapinfluence

5 Ways To Unearth More Value From Social Listening

Published By: Sprinklr     Published Date: Nov 22, 2016
In this social listening whitepaper, you'll learn that listening technology provides brands with the power to reach consumers via the digital platforms where they research, make, and discuss their purchasing decisions.
Tags : 
social listening, value, consumers, purchasing decisions, listening technology, listening, tools, whitepaper
    
Sprinklr

7 Tips for Getting Started with Location-Based Marketing

Published By: Silverpop     Published Date: Jun 15, 2012
People are increasingly using smartphones for researching, social networking and "checking in" on Foursquare. Learn how you can tap the power of location-based marketing, using customers' real-world behaviors and location to reach them when it's most relevant.
Tags : 
marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns
    
Silverpop

71 Ways to Get Media Coverage

Published By: Cision     Published Date: May 02, 2016
Social. Emails. Blogs. Brands have more ways than ever to reach customers, yet your brand, your competitors, mom-and-pop shops and Fortune 500s fiercely compete for media coverage. What gives?
Tags : 
cision, media coverage, public relations, brands
    
Cision

71 Ways to Get Media Coverage

Published By: Cision     Published Date: Jul 08, 2016
Social. Emails. Blogs. Brands have more ways than ever to reach customers, yet your brand, your competitors, mom-and-pop shops and Fortune 500s fiercely compete for media coverage. What gives?
Tags : 
cision, media coverage, public relations, brands
    
Cision

8 Steps to a Better Social Media Mix

Published By: Oracle     Published Date: Feb 28, 2014
Discover the 8 steps to help clearly make decisions about your social media mix and online communications strategy.
Tags : 
social media, social media marketing, social technology, social reach, social vendors
    
Oracle

A New Mandate for IAM with Multifactor Authentication

Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA

An Introduction to Twitter for the Real-Time Advertiser

Published By: Quantcast     Published Date: May 09, 2014
Download this guide to learn how you can drive better engagement and reach new prospects based on web-wide browsing behavior and interests.
Tags : 
quantcast, twitter, tweeting, social media, real time advertiser, branding, customer engagement, reach
    
Quantcast

Benchmark Report: Data Drives Social Media Performance

Published By: SocialFlow     Published Date: Oct 30, 2014
Research shows that Data-Driven Social Media publishing delivers a 91% increase in reach and a 26% increase in engagement. This report is based on 1.6 M posts on Facebook, Twitter and Google Plus, and proves that how you distribute your social posts is more important to improving your engagement than what you’re posting.
Tags : 
social media, social media management, social performance, social best practices, social publishing, social media results, earned media, facebook results
    
SocialFlow

Building a Social Business Vision for Insurers

Published By: IBM     Published Date: Sep 30, 2013
Insurers are discovering the power of conjoining advanced technologies for collaboration, social media and mobile with business processes. The result is social business, which embeds advanced technology tools, media and practices into the ongoing activities of the organization. Social business reaches across the enterprise and then extends to customers and partners. Read this white paper to learn more.
Tags : 
ibm, social business, insurance, social media, media technology, it platforms, customer service, networking
    
IBM

Choosing the Right API Management Solution for the Enterprise User

Published By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
    
CA Technologies

Choosing the Right Business Process Automation Solution - RFP Template

Published By: K2     Published Date: Jun 10, 2015
Business process management (BPM) needs can vary widely, from top-down business transformation initiatives to smart process applications to enterprise resource planning, marketing, social and more. With this breadth and depth of reach, BPM – and BPA, business process automation – are more than a couple of buzzwords, they are absolutely mission critical.
Tags : 
    
K2

Closing Deals on the Spot With The Right Mobile Tools

Published By: Ethofy     Published Date: Mar 18, 2013
Examine the AIDA sales model using the right mobile tools and learn how to empower your sales teams to meet customer expectations and close more deals on the spot
Tags : 
mobile, mobile sales tools, sales tools, social media, social marketing, social messaging, mobile devices, mobile sales enablement
    
Ethofy

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization

Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
    
Mimecast

Creating A Truly Social Business

Published By: Socialbakers     Published Date: Aug 05, 2015
The benefits of running a truly social business are many - driving shorter sales cycles, improving customer care, innovating your talent recruitment strategies, and improving how you coordinate your organization from top to bottom in pursuing unified goals.
Tags : 
social media, social business, customer care, recruitment, recruitment strategies, marketing tools, social techniques, social media strategy
    
Socialbakers

Creating an Effective Social Recruiting Strategy - guide

Published By: Oracle     Published Date: Apr 22, 2014
A detailed explanation of the benefits of using social recruiting and a guide to creating an effective strategy.
Tags : 
social recruitment, media, social media marketing, social technology, social reach, social vendors, human resources services, recruiting software/services
    
Oracle

Do More With Email Deliverability and Privacy

Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that don’t comply with standards and regulations. And today’s email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle

E360 Smart Paper to Be Customer

Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data, it management, knowledge management
    
IBM

Email in the Age of Social Media

Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
    
StrongMail

eMarketer Social Ads Spend Forecast through 2014

Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues
    
Adobe

Finding the Right Balance

Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
SilverSky

How Employee Advocacy Boosts Content Marketing

Published By: Smarp     Published Date: Feb 22, 2019
Employee Advocacy relies on individual expertise on social media to support companies’ and individuals’ branding needs. All of this is done through content, accessible to all those who are part of the Employee Advocacy program. How exactly do Employee Advocacy and content marketing go together? There are four aspects that make Employee Advocacy highly relevant to content marketing efforts. 1. Alignment around a shared content strategy 2. Measuring Results 3. Boosting contents reach and engagement 4. Trust and authenticity
Tags : 
content marketing, employee advocacy, social media, content visibility, brand visibility
    
Smarp
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.