The document discusses strategies for effective email marketing programs. It covers topics such as developing an email strategy, changing perceptions of email, optimizing for engagement and spam filters, integrating email with other systems, testing email content, and analyzing email analytics. The presentation provides advice on how to evolve email marketing practices and increase subscriber relevancy and engagement.
1 of 84
Download to read offline
More Related Content
A Deep Dive into Email Programs: What's Working Now to Engage Customers
1. Welcome to the 2010
Digital Marketing World
Virtual Conference Series
A Deep Dive into Email Programs:
What's Working Now to Engage Customers
Bill Leming, Vice President, Strategic Services, SubscriberMail
3. A Deep Dive into
e-Newsletters
Bill Leming
VP S trategic Services
SubscriberMail
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
4. Agenda
Email Strategic Evolution
Strategy
Perception
Human Connection
SPAM
Relevancy/Engagement
Integration
Social
Testing/Analytics
Mobile
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
7. Email marketing has evolved into a
sophisticated medium
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
8. Email Marketing: Old vs. New
The Old Way The New Way
Build a mailing list, anyway you can Quality vs. quantity
Fool the IS to boost delivery
Ps Authentication and reputation
Avoid spam words that trigger filters Engagement and content
How many people opened? Conversions/ROI
Image-focused messages Smart layouts, pre-headers
Cute subject lines Engaging, non-teaser formats
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
9. How do I evolve my email
marketing?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
10. Start Thinking Strategically
The blueprint or foundation of an effective email marketing
program
S the goals and program objectives for an overall email
ets
initiative
Analyze results and optimize for sustained success
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
11. Key Areas of Email Strategy
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
12. Objectives: What business objectives are we trying to achieve?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
13. Objectives: What business objectives are we trying to achieve?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
14. Audience Segments: How will audiences be segmented?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
15. Data Opportunities: What data should be collected and used?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
16. Message Types: What types of messages will be sent to segments?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
17. Message Frequencies: How often should messages be sent?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
18. Key Metrics: What defines success, and how should it be measured?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
19. Technology: What technology integration is required?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
20. Changing perceptions of email
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
21. =
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
22. =
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
23. The Necessity of the Human
Connection
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
24. Youre not sending to this
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
25. Youre sending to this
Broadcast has given way to
narrowcast
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
26. The recipient definition of SPAM
has changedSo should yours
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
27. The First SPAM Message Ever:
DIGITAL WILL BE GIVING A PRODUCT PRESENTATION OF THE NEWEST
MEMBERS OF THEDECSYSTEM-20 FAMILY; THE DECSYSTEM-2020, 2020T, 2060, AND
2060T. THEDECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX
OPERATING SYSTEMAND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE.
BOTH THE DECSYSTEM-2060TAND 2020T OFFER FULL ARPANET SUPPORT UNDER THE
TOPS-20 OPERATING SYSTEM.THE DECSYSTEM-2060 IS AN UPWARD EXTENSION OF
THE CURRENT DECSYSTEM 2040AND 2050 FAMILY. THE DECSYSTEM-2020 IS A
NEW LOW END MEMBER OF THEDECSYSTEM-20 FAMILY AND FULLY SOFTWARE
COMPATIBLE WITH ALL OF THE OTHERDECSYSTEM-20 MODELS.WE INVITE YOU TO
COME SEE THE 2020 AND HEAR ABOUT THE DECSYSTEM-20 FAMILYAT THE
TWO PRODUCT PRESENTATIONS WE WILL BE GIVING IN CALIFORNIA
THISMONTH. THE LOCATIONS WILL BE:TUESDAY, MAY 9, 1978 - 2 PMHYATT HOUSE
(NEAR THE L.A. AIRPORT)LOS ANGELES, CATHURSDAY, MAY 11, 1978 - 2
PMDUNFEY'S ROYAL COACHSAN MATEO, CA(4 MILES SOUTH OF S.F. AIRPORT AT
BAYSHORE, RT 101 AND RT 92)A 2020 WILL BE THERE FOR YOU TO VIEW. ALSO
TERMINALS ON-LINE TO OTHERDECSYSTEM-20 SYSTEMS THROUGH THE ARPANET. IF
YOU ARE UNABLE TO ATTEND,PLEASE FEEL FREE TO CONTACT THE NEAREST DEC
OFFICEFOR MORE INFORMATION ABOUT THE EXCITING DECSYSTEM-20 FAMILY.
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
28. Perception vs. Reality
The definition of SPAM has changed
Spam is the use of electronic messaging systems
(including most broadcast media, digital delivery
systems) to send unsolicited bulk emails
indiscriminately
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
29. SPAM is in the Eye of the Beholder
If a message looks like spam to a recipient, they will
report it even if it is legitimate and/or theyve previously
opted in
Avoid ALL CAPS in your subject lines
Spelling, grammar, punctuation
Ambiguous subject lines
Awkward personalization
The level of recipient engagement far outweighs SPAM
verbiage in the eyes of ISP filters
A legitimate message with major display errors can be
misconstrued as SPAM
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
30. SPAM is in the Eye of the Beholder
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
31. SPAM is in the Eye of the Beholder
Today we are dealing with more savvy/impatient email
recipients
Compliance with the legal definition is no longer
enough
Recipients define SPAM as any email they do not
wish to receive
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
32. Optimizing for SPAM Filters
Tools to help
Run messages through a S PAM check to
analyze content prior to deployment
Automatic bounce and unsubscribe
processing
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
33. Optimizing for SPAM Filters
Best Practices
Make sure you are authenticated
Utilize delivery monitoring whether in-house or
through an ES P
Ensure everyone sending on behalf of your
organization is utilizing best practices (digital
reputation)
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
34. If engagement is king, how do you
increase it?
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
36. Integration is Key
A way for clients to connect
their email programs with
other existing sales and
marketing tools
Creates a way for different
technologies to be used in
tandem
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
37. Gathering Data
Get recipients involved in
choosing what they want
from you
Email preference centers
Surveys
Personalized offers
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
38. Gathering Data
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
39. Gathering Data
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
40. Data Through Integration
Email & CRM
Send email based on online/offline purchase activity
Enhance segmentation efforts
Lifecycle messaging
Data synchronization
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
42. Email testing is about leveraging
the mediums unique ability to
provide fast and accurate results to
incrementally improve your email
marketing efforts
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
43. Beyond the A/B S Test
plit
Testing is about creating a user scenario or behavior
not just creating a specific element in your message
Determine objectives for short term and long term goals,
formulating tests that can help incorporate each of those
aspects
Go further than just splitting your list into two equal
groups:
Test within main segments and sub-segments
Test new subscribers vs. old subscribers
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
44. Define Your Goals
To optimize engagement, test:
Day/time to send
From name
Subject lines
Creative/layout
Copy
Calls to action
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
45. Learn and Refine
M T W Th F
Newsletter deployed each day of the week to a different group of 50K recipients.
Test objective:
Which day of the week yields the best results?
An alternative method:
Historical data should already make a strong case for the days of the week that typically
perform best. S egment your most active subscribers and conduct an Nth sample test over the
days in question.
* D epend on your m ost loyal, engaged subscr iber s t o pr ovide t he t ype of
dat a you can act on wit h confidence.
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
46. Methods N-th Level Splits
2nd 1st In this example, every 4th
subscriber is added to the
3rd sample audience.
4t
h
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
47. Methods Multivariate Testing
Gr oup A Subject Line 1 1-Column Layout Offer 1
Gr oup B Subject Line 1 1-Column Layout Offer 2
Gr oup C Subject Line 1 2-Column Layout Offer 1
Gr oup D Subject Line 1 2-Column Layout Offer 2
Gr oup E Subject Line 2 1-Column Layout Offer 1
Gr oup F Subject Line 2 1-Column Layout Offer 2
Gr oup G Subject Line 2 2-Column Layout Offer 1
Gr oup H Subject Line 2 2-Column Layout Offer 2
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
48. Advanced Testing
Heat-mapping to track eye movements of email recipients
Source: 3M Visual Attention Service
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
49. Test Against Recent Trends
Stock photos vs. real photos
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
50. Test Against Recent Trends
Stock photos vs. real photos
New study shows that big, feel-good images that
are largely decorative are mainly ignored online
Stock photos or generic people are also disregarded
People engage more with a photo if they know the
image or the person in the photo is real
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
51. Analytics Integrations:
Closing the Loop
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
53. Analytics Integration
Email & Analytics
Data beyond the click
Web funnel analysis and optimization
Cross/Upsell opportunities based on
behaviors
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
58. Analytics Today: S.A.M.E Project
eec S.A.M.E. (Support Adoption of
Metrics for Email) Project
Combating lack of consistent email
metrics standardization by creating a
standardized metrics for industry
adoption
Creating new definitions for email
metrics
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
59. Practical Applications
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
69. Engaging Through Other Channels
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
70. Engaging Through Social Media
Broaden reach by
allowing subscribers to
share content online
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
71. Engaging Through Social Media
Build your social
media following
through email
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
72. Engaging Through Social Media
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
73. Engaging Through Social Media
Use social media to acquire engaged subscribers
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
74. Engaging Through Mobile
More than 1 billion consumers will be accessing email on
their mobile phones by the year 2013, compared to fewer
than 200 million in 2009
21% of mobile marketing responders indicated that they
respond to three or more offers per month
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
75. Engaging Through Mobile
Simple changes to your normal messages can ensure that mobile users can
clearly see your messages
Include a link to a plain text version in your HTML message
Use descriptive alt text for images to display on phones where images
are blocked
Use the subject line and pre-header to promote your main call to
action
Subject lines should be around 35 characters
Think vertical some mobile displays are as small as 320 pixels
wide
Give links enough space to be clickable
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
76. Engaging Through Mobile
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
77. Engaging Through Mobile
Email & SMS
Dual acquisition
Cross-channel communication
and follow-up
Message-by-medium optimization
(long vs short, time-sensitive vs
at-your-convenience)
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
78. Engaging Through Mobile
Email
Landing Page
SMS
Message
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
79. Text SMail to 639227
Visit http://tinyurl.com/3586shq
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
80. Summary
Always be evolving
Think strategically long-term how do you achieve
your goals?
Engage with your subscribers as individuals not just a
number in a statistic
Always be testing and analyzing
Look for new ways to integrate your email: mobile/social
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
81. Never stop progressing, testing,
exploring
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
82. Questions?
Bill Leming
VP S trategic Services
info@subscribermail.com
630.303.5000
CONFIDENTIAL AND PROPRIETARY
息2010 SubscriberMail. All rights reserved.
84. Please join us in the Networking Lounge for a
Moderated Q&A with Bill Leming
In the Networking Lounge,
click on Scheduled Chats to join the discussion NOW