Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Administration, e-Mail Management, Email Response Management, Mailbox Management, e-Mail Response Management, Electronic Mail Management, e-Mail Administration
DEFINITION: Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether. The origins of email bankruptcy as a term are not clear. One of the earliest examples of the practice, whether identified as such or not, was by Stanford computer science professor Donald E. Knuth. Knuth was an  … 
Definition continues below.
Email Management Reports
1 - 25 of 307 Matches Previous Page  |  Next Page
Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

How to Successfully Migrate to Office 365
sponsored by CDW
RESOURCE: It can be challenging and disruptive to migrate all company email, files, and users to Microsoft Office 365. Explore a step-by-step process to help make your migration to Office 365 a success. Discover how Evans Food Group was able to cost-effectively deploy Office 365.
Posted: 12 May 2016 | Published: 09 Nov 2015

CDW

Donald J Pliner Seamlessly Migrates Email to the Cloud
sponsored by CDW
CASE STUDY: A footwear company needed a way to migrate their email and productivity apps from on-premises to a cloud data center. Explore the strategy that enabled them to find a licensing plan that fit their needs for the least amount of money. Learn how they were able to make their email migration easier while still maintaining control over the process.
Posted: 11 May 2016 | Published: 31 Dec 2015

CDW

How to Prepare for Exchange 2016, SharePoint 2016 and Office 365
sponsored by Dell Software
WHITE PAPER: This white paper digs into the first area of Exchange 2016, SharePoint 2016, and Office 365 migration preparation – inventory and assessment – by showing you how to gain deep insight into your entire legacy environment and remediate issues before the migration starts.
Posted: 10 May 2016 | Published: 10 May 2016

Dell Software

The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp

Automate email encryption to best protect corporate data
sponsored by ZixCorp
WHITE PAPER: This white paper provides an overview of why it's important to encrypt every corporate email you send and receive. Access now to learn how you can automatically encrypt emails eliminating the risk of interception and allowing your business peace of mind.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 email security and ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Email Continuity: Protecting your Business Against Email Downtime
sponsored by LogicNow
WHITE PAPER: With today's organizations relying on email as a critical communication tool, they can ill-afford any downtime. This white paper discusses how to overcome email outages with an externally hosted email continuity service, which allows organizations to avoid lost productivity, lost business, and other consequences that arise from email outages.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Hook, Line, and Sinker: How Credential Phishing is Changing
sponsored by Proofpoint, Inc.
WHITE PAPER: Find out the facts about phishing attacks and a 4-step strategy to stop them.
Posted: 04 Apr 2016 | Published: 30 Mar 2016

Proofpoint, Inc.

Email Phishing: The Impostor in the Machine
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox
Posted: 04 Apr 2016 | Published: 16 Mar 2016

Proofpoint, Inc.

Case Study: Cloud Collaboration Streamlines Business Processes
sponsored by IBM
VIDEO: If you're looking for a platform with online collaboration tools and integrated web email to engage your teams and foster greater productivity, view this brief YouTube video and see how early adopters of SmartCloud solutions are reaping huge rewards for pennies on the dollar.
Posted: 04 Apr 2016 | Premiered: 03 Apr 2013

IBM

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Make More Money with Enterprise Mobility Suite Part 1
sponsored by Microsoft
WHITE PAPER: Enterprise mobility suite (EMS) is the next tool that is going to be making its mark on the business landscape. This white paper will teach you the basics of EMS, who it will benefit, and pain points that are being addressed.
Posted: 25 Mar 2016 | Published: 27 Nov 2015

Microsoft

Guaranteed Business Continuity Thanks to Email Security Gateways
sponsored by LogicNow
RESOURCE: With business continuity on the line, protecting your email, network, and users is imperative. Are secure email gateways (ESGs) the only way to do so? This infographic reviews the many threats IT faces regarding IT security; take a look at how ESGs may prove themselves worthy.
Posted: 10 Mar 2016 | Published: 03 Feb 2016

LogicNow

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

How to Defend Office 365 From Cybercrime
sponsored by LogicNow
WHITE PAPER: This white paper outlines how you can defend Office 365 from cybercrime and protect corporate data using cloud-based email security. Learn how this security strategy helps to protect users from phishing, malware infections, and more.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

LogicNow

Cloudmark Trident: Stop Spear Phishing in its Tracks
sponsored by Cloudmark
VIDEO: 91% of the millions of cyber attacks launched each day come from email. Is your email security prepared to handle sophisticated spear phishing attacks? In this video, explore how hackers successfully land attacks and how you can bolster your email defenses.
Posted: 21 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Survey Reveals Spear Phishing as Top Security Concern of Enterprises
sponsored by Cloudmark
RESOURCE: This infographic looks in finer detail at the repercussions of a top enterprise security concern: spear phishing. View now to learn the damages and costs your organization may face if email security is ignored.
Posted: 21 Jan 2016 | Published: 04 Dec 2015

Cloudmark

Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks
sponsored by Cloudmark
RESOURCE: Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.
Posted: 18 Jan 2016 | Published: 06 Jan 2016

Cloudmark

Squash Large Business Email Security Challenges
sponsored by Mimecast
EGUIDE: This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis. Access now to learn how to overcome complexity in Exchange environments, incident response, and more.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Mimecast
1 - 25 of 307 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL MANAGEMENT DEFINITION (continued): …  early adopter of email, in 1975. However, he gave it up 15 years later. Quoted in an article in The Washington Post, Knuth explained "I'd get to work and start answering e-mail -- three hours later, I'd say, 'Oh, what was I supposed to do today?'" He took the extreme route and simply stopped using email and has never regretted his decision, proclaiming that "I have been a happy man since Jan. 1 , 1990."Creative Commons founder, law professor and Wired columnist Larry Lessig popularized the term and concept when he officially declared email bankruptcy in a mass email. In 2004, … 
Email Management definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement