Contact Support

Bookmark This Page

Opening Tools

You can view the tools by clicking on the Browse Tools main navigation. To use the tools, you must add them to a project, then from the Project Details screen, click the Open icon and the tool will open in a new window for use.

Entering Values

After opening a tool from your project, type directly into the field to input your responses. You don’t have to answer every question – if you leave it blank it won’t display in your report. Double and triple entry fields display in a table in your report. Click the green plus to the right to add more fields, and click the paper icon to view any previous entries for the field.

Make sure to click Save before closing. More>>>

Adding Tools

To add tools to your project, click the Add dropdown from the Project Details screen to open the Browse Tools window. Select the tasks, deliverables or categories you’d like to add and click Add Selected to Project.

Modifying Descriptions

To modify the description of the task or deliverable, click the Edit icon and enter/modify the text in the Description field. These descriptions will display when you output your work to a PDF report.

Outputting Results

To output the results of your work, in the Project Details screen click the green PDF icon to publish to a PDF. You can out the results of a task, a deliverable (which includes all the tasks), a category (which includes all the deliverables) or a project (which includes all the categories). To output a project content, select the Reports dropdown and the Project Content.

The PDFs at each level contain different formatting. More>>>

Setting Up Your Account

You can set up a free Preview account which will give you full functionality for 14 days so you can test drive the platform. All you need to enter is your email address, name and phone number.

Setup your free Preview account here.

When you’re ready to upgrade to a full account, you can create it here.

How to Use

Need guidance to solve a quick marketing problem? Tasked with creating a positioning, brand, pricing or distribution strategy? Need to write a marketing plan or design an integrated marketing campaign? Looking to validate your company’s marketing investments? Seeking to develop skills in new areas? Looking for succinct guidance for your marketing activities, tying strategy to sales and measuring marketing return on investment?

These are all reasons why our customers use Marketing MO.

Here you can dig deeper about how to use it in your daily marketing activities:

  • Campaign Validation
  • Marketing Strategy
  • Marketing Planning
  • Marketing ROI Measurement
  • Marketing Support System
  • Learning

Protecting Your Data

We protect the customer area of this website with the most secure SSL encryption technology available today — up to 256 bits — to protect your confidential and proprietary data. SSL encrypts communications between your computer and our servers. This keeps your data protected from virtual prying eyes.

We use Amazon’s Web Services to host our application and store your data. Amazon has many years of experience in designing, constructing, and operating large scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms, as well as other natural boundary protection.

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Amazon provides data center access and information only to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, their access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.

Security within Amazon EC2 is provided at multiple levels: The operating system (OS) of the host system, the virtual instance operating system or guest OS, a stateful firewall and signed API calls.

Each of these items builds on the capabilities of the others. The goal is to ensure that data contained within Amazon EC2 cannot be intercepted by non-authorized systems or users and that Amazon EC2 instances are themselves as secure as possible without sacrificing the flexibility in configuration that customers demand.

Accessing the Tools

You can access the tool from the Browse Tools section in the main navigation, from the Add>Tools dropdown when you’re working in your project, or from the tasks loaded in a pre-built project.

SSL Encryption

SSL stands for Secure Sockets Layer. SSL encrypts communications between your computer and our servers. This keeps your data protected from virtual prying eyes.

We protect the customer area of this website with the most secure SSL encryption technology available today — up to 256 bits — to protect your confidential and proprietary data.