Software  >   Applications Software  >   Communications Software  >  

e-Mail Management Applications

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Management Applications White Papers (View All Report Types)
 
A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks
sponsored by Mimecast North America
WHITE PAPER: Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast North America
WHITE PAPER: Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

5 Essentials for Cloud Archiving Success
sponsored by Mimecast North America
WHITE PAPER: Discover 5 essentials for email cloud archiving to keep your enterprise's data safe, available for easy access and sharing across the organization.
Posted: 30 Dec 2016 | Published: 30 Dec 2016

Mimecast North America

Kofax for Digital Mailrooms
sponsored by Kofax, Inc.
WHITE PAPER: Handling large volumes of incoming mail - and making sure it reaches the right recipients at the right time - is key to operational efficiency and customer service quality across a variety of departments and processes. Check out this white paper to learn a better way to automate the business processes in the mailroom.
Posted: 24 Feb 2011 | Published: 23 Feb 2011

Kofax, Inc.

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

E-Invoicing Efficiency without Customer Dissatisfaction: Automating Mail and Email Delivery from SAP® Applications
sponsored by Esker Inc.
WHITE PAPER: Learn how intelligent automation technology can ease the transition to e-invoicing by completely eliminating any conflict between your company's desire for automated billing and varying customer preferences for receiving invoices.
Posted: 04 Oct 2007 | Published: 04 Oct 2007

Esker Inc.

Sunbelt Exchange Archiver for MS-Exchange Environments
sponsored by Sunbelt Software
WHITE PAPER: This white paper describes a an email archiving technology that provides a unified storage technology that reduces the Microsoft Exchange load and can integrate easily into existing IT systems.
Posted: 24 Jan 2008 | Published: 01 Nov 2007

Sunbelt Software

Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

What Are Your Obligations to Retain Email and Other Electronic Content?
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

EMC Backup and Recovery Solutions

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement