Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Administration

RSS Feed    Add to Google    Add to My Yahoo!
Email AdministrationReports
 
Mitigating Email Virus Attacks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Optimizing Microsoft Exchange in the Enterprise: Optimizing the Mailbox Server Role and the Client Access Server
sponsored by Global Knowledge
WHITE PAPER: Access part one in a two part series on optimizing Exchange Server 2010 in the enterprise. Uncover details about the advanced features of the mailbox and client access servers along with simple tips and tricks for improving your Exchange environment.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Global Knowledge

Wake Up From Your Mobile Nightmare
sponsored by Citrix
EBOOK: This informative and entertaining guide takes a look at a mobile email solution from industry leader Citrix that provides the scale, functionality and management control IT requires without holding users back from their mobile devices, applications or productivity.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

Citrix

Understanding Advanced Persistent Threats and Complex Malware
sponsored by Dell SecureWorks UK
WEBCAST: Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks UK

How Fax and Email Orders are Holding Your Business Back
sponsored by Esker Inc.
EBOOK: To avoidissues caused by fax and email sales orders, many savvy companies are turning to automation technologies for help. In this resource, discover how an automated order processing platform works, and discover the benefits you could experience from paperless order processing.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

Esker Inc.

Mobile Security: Email is Your Biggest Risk
sponsored by TITUS
WHITE PAPER: In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.
Posted: 02 May 2013 | Published: 31 Dec 2012

TITUS

Kahuna Ventures Eliminates Email PST Files and Improves Data Retention and Recovery with Metalogix
sponsored by Metalogix
WHITE PAPER: Discover how a company reduced its email volume by 50 percent and enabled faster backups and recovery with an email archiving solution. Explore the advantages of implementing this archiving system, including the ability to eliminate management of burdensome PST files and comprehensive legal retention features.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Metalogix

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
sponsored by Mimecast
EBOOK: This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
Posted: 04 Oct 2011 | Published: 04 Oct 2011

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement