Close

Top Stories From This Week

Previous Next

Resource Library

Resource Library

9 Item(s)

  • Presented by: SecureBuy

    SecureBuy has been fighting against “friendly fraud” and “cyber shoplifting” by developing solutions to keep criminals out of the shopping cart.

    Quick view Download Now
    IR Thought Leadership
    Date: March, 2014

    SecureBuy has been fighting against "friendly fraud" and "cyber shoplifting" by developing solutions to keep criminals out of the shopping cart. The recent onslaught of data breaches and FBI warnings of increasing attacks have pushed fraud prevention to the top of many merchants' priority lists. Yet finding the silver bullet to manage e-commerce fraud can be daunting.

    Sponsored by SecureBuy

  • Presented by: Windsor Circle

    CoffeeForLess was able to make over half a million dollars in six months by leveraging purchase history data imported by Windsor Circle.

    Quick view Download Now
    Case Study
    Date: February, 2014

    CoffeeForLess, an IR500 retailer, adopted Windsor Circle's software and services to help increase brand awareness and loyalty through automated lifecycle marketing, with the ultimate goal of getting more customers to their third purchase, a critical retention metric. CoffeeForLess was able to make over half a million dollars in six months by leveraging purchase history data imported by Windsor Circle. Check out this brand new case study to learn more.

    Download this free 6-page case study and learn:

    – Which data drove 66% more opens and 125% more clicks
    – How to use order data to automate replenishment campaigns
    – How to ID and save your churning customers
    – More about the data-driven customer life cycle

    Click below to download this free case study featuring CoffeeForLess.

    Sponsored by: Windsor Circle

  • Presented by: Sumall

    As marketers, we often focus our attention on attracting new customers while neglecting the needs of our most valuable demographic. Returning customers may have the lowest acquisition costs but help us to build and sustain the highest profits.

    Quick view Download Now
    White Paper
    Date: October, 2013

    We all do a million things to grow our business, but have you ever stopped to think about the true value of some of your best customers?

    As marketers, we often focus our attention on attracting new customers while neglecting the needs of our most valuable demographic. Returning customers may have the lowest acquisition costs but help us to build and sustain the highest profits.

    Lifetime Value, or LTV, is an assessment of how often customers return and how much they spend. Businesses can use LTV to derive the value of their company and to determine the amount that is available to spend on acquiring customers. This paper will provide insights and statistics on why LTV is regarded as the guidepost for most businesses as well as provide ways you can find out who your returning customers are and how to keep that number up.

    Sponsored by: SumAll

  • Presented by: ThreatMetrix

    Download this whitepaper to understand how your online business can use global trust intelligence to combat organized cybercriminals.

    Quick view Download Now
    White Paper
    Date: September, 2014

    Cybercrime is costly for all online businesses and can no longer be ignored. Well-organized cybercriminals operate in powerful networks that allow them to attack thousands of online businesses using an efficient and scalable model. Download this whitepaper to understand how your online business can use global trust intelligence to combat organized cybercriminals.

    Sponsored by: ThreatMetrix

  • Presented by: LexisNexis

    These downloads spell out what merchants should do right now to mitigate fraud risk and improve profits in 2014.

    Quick view Register
    Webinar
    Date: March, 2014

    Reap the Benefits of eCommerce While Minimizing Fraud

    The recent LexisNexis Post-Holiday webinar: eCommerce, mCommerce and Your Risk Solutions Process summarized the impact of fraud on 2013 holiday business for retailers that accept Internet and mobile transactions—and who doesn't these days? If you missed the webinar, these downloads spell out what merchants should do right now to mitigate fraud risk and improve profits in 2014.

    Download the webinar materials to learn:

    – Key fraud issues affecting the eCommerce & mCommerce space;
    – What you need to know about data breaches and the affect they can have on your business;
    – What steps to take to protect your retail/eCommerce business this year;
    – How to strengthen your authentication and anti-fraud measures; and

    Click through to download the webinar recording and slide deck to get all of the insights from 2013 and learn strategies to improve your outlook for 2014.

    Sponsored by: LexisNexis

  • Presented by: DynamicAction

    The results of an early 2014 Internet Retailer survey of 165 retail executives suggest that while they have lots of data, they can't use it effectively to make decisions that will increase profits—and that they know it. A big part of the problem is that retailers collect data through a myriad of systems, and that they lack the means to quickly establish relationships between data sets and draw meaningful conclusions.

    Quick view Download Now
    IR Thought Leadership
    Date: April, 2014

    What a siloed retail organization means to your bottom line

    Online retailers have lots of data ... but can they use it effectively to make decisions that will increase profits.

    The results of an early 2014 Internet Retailer survey of 165 retail executives suggest they can't today—and that they know it. A big part of the problem is that retailers collect data through a myriad of systems, and that they lack the means to quickly establish relationships between data sets and draw meaningful conclusions.

    These results and special survey report reflect the reality that too often retailers can only peer into the information collected by one department at a time.

    Sponsored by: DynamicAction

  • Presented by: Sumall

    Social media can be like navigating a labyrinth of retweets, likes, and pins, innocently wandering from friends’ wedding photos to sepia-filtered shots of puppies until you find yourself pinning peanut butter cheesecake recipes into the early morning hours wondering how it came to this. But once you’ve snapped out of your daze, you’ll see that maintaining your business’s presence on social media is an awesome way to directly interact with customers, potential leads, and fans.

    Quick view Download Now
    White Paper
    Date: October, 2013

    Social media can be like navigating a labyrinth of retweets, likes, and pins, innocently wandering from friends’ wedding photos to sepia-filtered shots of puppies until you find yourself pinning peanut butter cheesecake recipes into the early morning hours wondering how it came to this. But once you’ve snapped out of your daze, you’ll see that maintaining your business’s presence on social media is an awesome way to directly interact with customers, potential leads, and fans.

    The SumAll blog is a reservoir of information on everything from e-commerce trends to website design in the form of quick step-by-step guides on how to gain a Twitter following as well as in-depth editorials on the state of big data. Social media has and continues to be the most coveted subject as small and enterprise businesses alike realize that platforms like Twitter and Instagram are integral in maintaining an effective marketing strategy.

    How Not to Suck at Social Media Marketing is our curated collection of 11 social media marketing stories from our blog to help you use social smarter.

    Sponsored by: SumAll

  • Presented by: ThreatMetrix

    Discover the most recent trends in online commerce fraud, and how you can leverage the experience of large banks and financial institutions to prevent online fraud at your e-commerce website.

    Quick view Download Now
    White Paper
    Date: September, 2014

    Discover the most recent trends in online commerce fraud, and how you can leverage the experience of large banks and financial institutions to prevent online fraud at your e-commerce website.

    Sponsored by: ThreatMetrix

  • Presented by: Neustar

    Learn how to defuse the three most common types of cyber attacks - distributed denial of service (DDoS), domain name system (DNS) and application layer attacks - and stay one-step ahead of these attackers.

    Quick view Download Now
    IR Thought Leadership
    Date: April, 2014

    How to defuse the growing threat from cyberattacks

    It is no longer a matter of IF e-retailers will be a target of a cyberattack, but WHEN.

    Retail cyberattackers are launching attacks with growing frequency and sophistication—and showing greater ability to evade detection. The net-net: Retailers are more vulnerable than ever.

    Learn how to defuse the three most common types of attacks – distributed denial of service (DDoS), domain name system (DNS) and application layer attacks – and stay one-step ahead of these attackers.

    Sponsored by: Neustar