Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email White Papers (View All Report Types)
1 - 25 of 129 Matches Previous Page  |  Next Page
Migration to Exchange Online and Office 365: A Step-by-Step Guide
sponsored by Quest
WHITE PAPER: Migrating to Office 365 and Exchange? If you haven't been part of a previous migration to Office 365, then you've got a steep learning curve ahead of you. Don't fret! Let this white paper be your guide as it takes you step-by-step and breaks down each step into its basic components to give you a smooth transition.
Posted: 24 Feb 2017 | Published: 30 Dec 2016

Quest

IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment
sponsored by Forcepoint
WHITE PAPER: In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Forcepoint

Email-borne Malware Highlights Danger of Over-reliance on Sandboxes
sponsored by Mimecast North America
WHITE PAPER: Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast North America
WHITE PAPER: Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Ransomware is Increasing the Risks and Impact to Organizations
sponsored by Mimecast North America
WHITE PAPER: Discover the increasing risk and impact of ransomware on the enterprise and what can be done to mitigate its effect. Learn about ransomware attack vectors, the real price of an attack, how to prevent ransomware, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Email Security in a Zero Trust World
sponsored by Mimecast North America
WHITE PAPER: Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks
sponsored by Mimecast North America
WHITE PAPER: Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Five Tactics to Stop Email Attacks
sponsored by Mimecast North America
WHITE PAPER: Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast North America
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 03 Jan 2017 | Published: 21 Jul 2016

Mimecast North America

5 Essentials for Cloud Archiving Success
sponsored by Mimecast North America
WHITE PAPER: Discover 5 essentials for email cloud archiving to keep your enterprise's data safe, available for easy access and sharing across the organization.
Posted: 30 Dec 2016 | Published: 30 Dec 2016

Mimecast North America

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

Email Security Best Practices to Help Avoid Downtime
sponsored by Rackspace
WHITE PAPER: This white paper aims to provide a deeper understanding of the factors that can impact your current email solution's security risks and unplanned downtime, as well how to help you better compare and evaluate your current email solution with that of a newer version.
Posted: 31 Oct 2016 | Published: 01 Sep 2016

Rackspace

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This e-book reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast
WHITE PAPER: To solve mailbox bloat, CIOs are turning to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

The Definitive Guide to Engaging Email Marketing
sponsored by Marketo
WHITE PAPER: Generic emails are a good way to alienate potential leads. Email marketing needs to be as engaging as possible in a market which bombards customers on a daily basis. Access this comphrensive guide to create the most engaging email marketing strategy possible.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Marketo

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Top 5 Reasons Why Enterprises Are Going Google
sponsored by Accenture
WHITE PAPER: This white paper discusses the top 5 reasons why enterprises are moving to the cloud by adopting Google Apps for collaboration and productivity. Learn how this cloud strategy can help you reduce the number of servers in use, embrace the mobile, BYOD culture, and more.
Posted: 16 Mar 2016 | Published: 16 Mar 2016

Accenture

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: Discover how you can accurately collect and examine threat intelligence to prevent phishing schemes from infecting your network. Gain knowledge and insight into malicious actors so you can prevent future, possibly business-crippling, attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

University Improves Learning with Cloud Messaging
sponsored by Dimension Data
WHITE PAPER: In this case study, explore how a university with a large, diverse student and staff population updated their ageing, legacy email system with a cloud messaging solution.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Dimension Data

Improving the Success of Your Enterprise's Email Marketing Campaigns
sponsored by Teradata
WHITE PAPER: This document outlines some of the standard best practices that can enhance email communications, including: segmentation, personalization, mobile optimization, and landing pages. It also includes mistakes to avoid to increase customer loyalty and nurture incoming leads.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Teradata

5 Reasons Why Email Archiving is the New Killer App
sponsored by Commvault
WHITE PAPER: Businesses use many applications every day, but one is used most frequently – email. This expert white paper details the top 5 reasons why email archiving is the most important application.
Posted: 31 Dec 2014 | Published: 01 Nov 2013

Commvault
1 - 25 of 129 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement