Contact Support

Bookmark This Page

Setting Up Your Account

You can set up a free Preview account which will give you full functionality for 14 days so you can test drive the platform. All you need to enter is your email address, name and phone number.

Setup your free Preview account here.

When you’re ready to upgrade to a full account, you can create it here.

How to Use

Need guidance to solve a quick marketing problem? Tasked with creating a positioning, brand, pricing or distribution strategy? Need to write a marketing plan or design an integrated marketing campaign? Looking to validate your company’s marketing investments? Seeking to develop skills in new areas? Looking for succinct guidance for your marketing activities, tying strategy to sales and measuring marketing return on investment?

These are all reasons why our customers use Marketing MO.

Here you can dig deeper about how to use it in your daily marketing activities:

  • Campaign Validation
  • Marketing Strategy
  • Marketing Planning
  • Marketing ROI Measurement
  • Marketing Support System
  • Learning

Protecting Your Data

We protect the customer area of this website with the most secure SSL encryption technology available today — up to 256 bits — to protect your confidential and proprietary data. SSL encrypts communications between your computer and our servers. This keeps your data protected from virtual prying eyes.

We use Amazon’s Web Services to host our application and store your data. Amazon has many years of experience in designing, constructing, and operating large scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms, as well as other natural boundary protection.

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Amazon provides data center access and information only to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, their access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.

Security within Amazon EC2 is provided at multiple levels: The operating system (OS) of the host system, the virtual instance operating system or guest OS, a stateful firewall and signed API calls.

Each of these items builds on the capabilities of the others. The goal is to ensure that data contained within Amazon EC2 cannot be intercepted by non-authorized systems or users and that Amazon EC2 instances are themselves as secure as possible without sacrificing the flexibility in configuration that customers demand.

Accessing the Tools

You can access the tool from the Browse Tools section in the main navigation, from the Add>Tools dropdown when you’re working in your project, or from the tasks loaded in a pre-built project.

SSL Encryption

SSL stands for Secure Sockets Layer. SSL encrypts communications between your computer and our servers. This keeps your data protected from virtual prying eyes.

We protect the customer area of this website with the most secure SSL encryption technology available today — up to 256 bits — to protect your confidential and proprietary data.

Hosting With Amazon.com

We use Amazon’s Web Services to host our application and store your data. AWS uses a Cloud Architecture, which means underlying computing infrastructure is used only when it is needed (for example to process a user request), to draw the necessary resources on-demand (like compute servers or storage), perform a specific job, and then relinquish the unneeded resources, (often disposing of themselves after the job is done).

Amazon currently has five cloud computing zones: the United States East, the United States West, Europe, Asia Pacific – Singapore and Asia Pacific – Tokyo. We currently use both the United States zones, Europe and Asia Pacific – Singapore.

Amazon’s EC2 offers a highly reliable environment where replacement instances can be rapidly and predictably commissioned. The service runs within Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.95% availability.

For more information visit Amazon Web Services.

Data Backup

We use Amazon’s S3 service to backup your data. S3 provides a highly durable storage infrastructure designed for mission-critical and primary data storage. Objects are redundantly stored on multiple devices across multiple facilities in an Amazon S3 Region. To help ensure durability, Amazon S3 PUT and COPY operations synchronously store your data across multiple facilities before returning SUCCESS. Once stored, Amazon S3 maintains the durability of your objects by quickly detecting and repairing any lost redundancy. Amazon S3 also regularly verifies the integrity of data stored using checksums. If corruption is detected, it is repaired using redundant data. In addition, Amazon S3 calculates checksums on all network traffic to detect corruption of data packets when storing or retrieving data.

Amazon S3’s standard storage is:

  • Backed with the Amazon S3 Service Level Agreement.
  • Designed to provide 99.999999999% durability and 99.99% availability of objects over a given year.
  • Designed to sustain the concurrent loss of data in two facilities.

Amazon S3 provides further protection via Versioning. We use Versioning to preserve, retrieve, and restore every version of every object stored in our Amazon S3 bucket. This allows us to easily recover from both unintended user actions and application failures. By default, requests will retrieve the most recently written version. Older versions of an object can be retrieved by specifying a version in the request. Storage rates apply for every version stored.

Passwords

We allow you to enter in your password when you create your account. You may also change your password from within the My Account area of your account.

If you forgot your password, you may reset your password here.