Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

e-Mail Management

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Management White Papers (View All Report Types)
 
Ransomware is Increasing the Risks and Impact to Organizations
sponsored by Mimecast North America
WHITE PAPER: Discover the increasing risk and impact of ransomware on the enterprise and what can be done to mitigate its effect. Learn about ransomware attack vectors, the real price of an attack, how to prevent ransomware, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Email Security in a Zero Trust World
sponsored by Mimecast North America
WHITE PAPER: Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Mitigating the Top 3 Office 365 Security Risks
sponsored by Mimecast
WHITE PAPER: This white paper examines how to mitigate the 3 key high risk areas of Office 365 email security.
Posted: 14 Sep 2015 | Published: 02 Sep 2015

Mimecast

What Are Your Obligations to Retain Email and Other Electronic Content?
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

EMC Backup and Recovery Solutions

Exchange Deployment Planning Services
sponsored by Dimension Data.
WHITE PAPER: Dimension Data's Exchange Deployment Planning Services (EDPS) are designed to help guide your organisation through the initial deployment planning stages of a Microsoft Exchange implementation. Read this paper to learn more.
Posted: 02 Jul 2010 | Published: 01 Sep 2009

Dimension Data.

Network Testing Labs Review: Make Internet Risks and Perils Disappear
sponsored by Intel Security
WHITE PAPER: Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.
Posted: 23 Nov 2009 | Published: 30 Jun 2009

Intel Security

Reap the benefits of Microsoft® Exchange sooner with Dell solutions
sponsored by Dell EMC and Microsoft
WHITE PAPER: This resource discusses the system requirements for running Exchange 2010 and offers advice to help you evaluate your existing infrastructure. Learn more about advanced system solutions that can maximize the advantages of this latest Exchange upgrade.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell EMC and Microsoft

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Business Continuity and Resiliency Services from IBM: Strengthen Your Business with Cloud Computing—Delivering Greater Resiliency and a More Globally Accessible Environment
sponsored by IBM
WHITE PAPER: Cloud computing can simplify scalability to improve business resiliency and flexibility. Read this paper to discover how cloud computing combined with IBM continuity and resiliency services can improve the efficiency of your infrastructure while also improving your business continuity.
Posted: 25 Aug 2010 | Published: 15 May 2009

IBM

The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER: Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement