Software  >   Applications Software  >   Communications Software  >   Collaborative Applications Software  >   Messaging Software  >  

Electronic Mail Software

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Mail Software Multimedia (View All Report Types)
 
Migrating to Office 365: Making the Migration a Smooth One
sponsored by Mimecast
WEBCAST: Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.
Posted: 26 Oct 2015 | Premiered: Feb 25, 2015

Mimecast

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

Lotus Symphony Demo
sponsored by IBM
PRODUCT DEMO: Work smarter with Lotus Sympony document software from IBM.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

IBM

What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange
sponsored by BlackBerry
WEBCAST: View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.
Posted: 12 Mar 2008 | Premiered: Mar 12, 2008, 09:00 EDT (13:00 GMT)

BlackBerry

Try LotusLive
sponsored by IBM
SOFTWARE DOWNLOAD: Sign up for a no charge 30-day trial of LotusLive Engage from IBM.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

IBM

API Strategies for Enhancing Monolithic Application Systems
sponsored by IBM
WEBCAST: This webcast explores the use of APIs for enabling more efficient data transport, even for monolithic systems. Discover how you can enable continuous delivery and enhance scalability. Plus, learn about the best language for building microservices and microservice APIs.
Posted: 13 Jul 2016 | Premiered: Jul 13, 2016

IBM

Why You Should Care about Identity-as-a-Service (iDaaS): An Expert's Perspective
sponsored by Rackspace
WEBCAST: This webcast defines identity-as-a-service in the context of real-world applications, and identifies the key capabilities it can provide, including credential management, claims issuance and acceptance, assurance of compliance, personalization information maintenance, and more.
Posted: 04 May 2016 | Premiered: Dec 31, 2015

Rackspace

How to Build an Engaging Mobile App in 45 Days
sponsored by Magnet
WEBCAST: This webcast reveals 7 steps to building a highly interactive enterprise mobile app in 45 days. Learn how to not only build apps quickly, but to create one that encourages and enables user engagement.
Posted: 04 Feb 2016 | Premiered: Feb 4, 2016


What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Solving Your Top 3 Archiving Challenges: Compliance, Cost, and Risk
sponsored by Proofpoint, Inc.
WEBCAST: Aging archiving systems were not built to store emails, social media records, and other modern digital files. View this webcast to ensure that your enterprise is compliant with the latest e-discovery laws and learn how to properly archive electronically stored information in the cloud.
Posted: 09 Jun 2016 | Premiered: Jun 9, 2016

Proofpoint, Inc.

Don't Settle for Passé Email Protection
sponsored by Mimecast
WEBCAST: In this webinar, you'll learn the basics on how to beef up your email protection strategy. Prepare yourself, your colleagues, and your organization for advancements in this evolving imperative.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

There Will Be Attacks: Prepare Your Email Defenses
sponsored by Mimecast
WEBCAST: Your organization can't tolerate any email downtime. Learn how to prevent damages to money, your reputation, and business operations with the right arsenal of email security tools.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Managing Cultural Change When Moving to the Cloud
sponsored by Box
WEBCAST: This webcast examines the technology that Hillwood leveraged to meet and conquer challenges like slow, specialized file sharing, and using email to send files back and forth. Discover the modern content management and collaboration platform they implemented to enable secure and easy file sharing.
Posted: 12 Sep 2016 | Premiered: Jul 31, 2016

Box

See How the Miami Marlins Protects Sensitive Scouting and Operation Documents
sponsored by Citrix
WEBCAST: Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.
Posted: 30 Aug 2016 | Premiered: Jul 22, 2016

Citrix

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016

Tasktop

Tool Overview: Find Actionable Insights in Employee Feedback
sponsored by Semos
VIDEO: Employee feedback is important, but it's only useful if you can derive actionable insight from it. Watch this 2 minute video to learn about a tool that makes responding to feedback and analytical decision-making more efficient and fruitful.
Posted: 07 Sep 2016 | Premiered: 25 May 2016

Semos

Today's Top 10 Web Hacking Techniques
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Protect Your Organization from Online Phishing
sponsored by Navex Global
WEBCAST: Protect your organization from illegitimate emails with this short, interactive resource. Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave

Ransomware - Anatomy of an attack
sponsored by Cisco
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco

Top Use Cases for App Virtualization
sponsored by Citrix
WEBCAST: Empower a mobile workforce with secure access to apps and data from a diverse set of mobile devices. Attend this webinar to learn about the top app virtualization use cases, complete with real-world customer examples.
Posted: 20 Aug 2015 | Premiered: Aug 20, 2015

Citrix

Take Command of Vendor Audits with Accurate IT Data
sponsored by BDNA
WEBCAST: This webcast offers information on why audits can turn into timely, costly, and complex processes, and how the amount, relevancy, and accuracy of the data can affect the audits.
Posted: 01 Nov 2016 | Premiered: Oct 12, 2016

BDNA

Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO: Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016

Proofpoint, Inc.

Securely Extend Your SharePoint® Content Externally
sponsored by IntraLinks, Inc
WEBCAST: External content sharing requires you to strike a balance between security and productivity that is difficult to find. Access this webinar to explore the security and cost challenges of sharing beyond your firewall as well as keys to secure, timely collaboration practices.
Posted: 06 Oct 2016 | Premiered: Oct 5, 2016

IntraLinks, Inc

SLA-Driven Data Protection Modernization: An ESG Video Interview
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 20 Sep 2016 | Premiered: 31 Mar 2016

IBM

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
PODCAST: In this podcast, you will discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Premiered: Nov 17, 2016

NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement