Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
1 - 25 of 238 Matches Previous Page  |  Next Page
Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: This white paper shows you how to protect your organization from email data breaches.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Building the Business Case for Email Archiving
sponsored by ArcMail Technology
EGUIDE: Access this expert e-guide to find out how to reduce risk associated with unchecked data, lower your total cost of ownership while improving performance and simplicity of operations, as well as consolidate control. Also explore the facets to look for in an email archiving tool.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

ArcMail Technology

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Top 5 Considerations in Choosing a Third-Party Solution for Email Archiving
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, discover 5 key considerations for choosing an email archiving tool, including ease of use/ease of deployment, compliance and e-discovery, storage management and server performance, and 2 more.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

ArcMail Technology

Keeping Email Vulnerability at Bay
sponsored by ArcMail Technology
WHITE PAPER: Access this CIO Review article to learn how email archiving is becoming a common way to fight data theft in enterprises today. Explore email archiving market trends and needs, how to ensure cost effective, continuous security, and more.
Posted: 27 Apr 2016 | Published: 06 Apr 2016

ArcMail Technology

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Email Continuity: Protecting your Business Against Email Downtime
sponsored by LogicNow
WHITE PAPER: With today's organizations relying on email as a critical communication tool, they can ill-afford any downtime. This white paper discusses how to overcome email outages with an externally hosted email continuity service, which allows organizations to avoid lost productivity, lost business, and other consequences that arise from email outages.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Three Ways to Better Connect Your Workforce with Enterprise Social
sponsored by Microsoft
WHITE PAPER: Download and discover how Enterprise Social allows your workers to connect to conversations, documents, and files that matter; be informed to make smarter decisions; and overall feel more engaged in their jobs and company culture.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Microsoft

Foster Collaborative Communication with SaaS
sponsored by IBM
VIDEO: If you're looking to lower your TCO, receive fast ROI and protect critical IP with the power of a collaborative software-as-a-service (SaaS) solution, download this quick just-the-facts video today. (Psst: it includes a hyperlink for a free trial of it, too!)
Posted: 05 Apr 2016 | Premiered: 17 Nov 2014

IBM

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Top 5 Reasons Why Enterprises Are Going Google
sponsored by Accenture
WHITE PAPER: This white paper discusses the top 5 reasons why enterprises are moving to the cloud by adopting Google Apps for collaboration and productivity. Learn how this cloud strategy can help you reduce the number of servers in use, embrace the mobile, BYOD culture, and more.
Posted: 16 Mar 2016 | Published: 16 Mar 2016

Accenture

Choose an Enterprise Cloud App Suite and Pull Off a Successful Migration
sponsored by Accenture
EGUIDE: In this expert guide, Tom Nolle, data communications expert with 33 years of experience, explains why companies migrating to Microsoft Office 365 need to plan, pilot-test and verify at every step. Plus, Google Apps and Office 365 are evaluated (side-by-side) in terms of features, functionalities and cost.
Posted: 09 Mar 2016 | Published: 03 Mar 2016

Accenture

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: In this Osterman Research report, learn how email is evolving and combining with new technologies. Explore how you can ensure that your email is securely integrated with new capabilities such as mobile and social, so that you can leverage email as a competitive advantage rather than allow it to become a liability.
Posted: 11 Feb 2016 | Published: 30 Jun 2014

IBM

How to Defend Office 365 From Cybercrime
sponsored by LogicNow
WHITE PAPER: This white paper outlines how you can defend Office 365 from cybercrime and protect corporate data using cloud-based email security. Learn how this security strategy helps to protect users from phishing, malware infections, and more.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

LogicNow

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Is Email Sapping your Organization's Productivity?
sponsored by ServiceNow
WEBCAST: In this webinar, Dave Wright, Chief Strategy Officer at ServiceNow, and Ron Markham, Strategy Leader at ServiceNow, address the drain in enterprise-level productivity, and the role of email in this drain. Access this video now to examine a cloud-based service that will streamline otherwise complex work processes.
Posted: 15 Sep 2015 | Premiered: Sep 15, 2015

ServiceNow

How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

Five Ways to Uncover Value in Your Data
sponsored by Commvault
WHITE PAPER: Access this white paper to learn how you can bring your dark data to light. Read on to find out five important ways to navigate the murky waters of unstructured data, like email, so that it can provide invaluable insights for business strategy.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Commvault

Today's State of Work: The Productivity Drain
sponsored by ServiceNow
WHITE PAPER: This survey of 1,000 managers at companies with over 500 employees provides data-backed insights into the inefficiencies they experience every day—and how they can be rectified. Read on to learn about services that can be used to automate your work processes end-to-end.
Posted: 21 May 2015 | Published: 21 May 2015

ServiceNow

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Is Your Sales Email Strategy Wasting or Maximizing Time?
sponsored by Microsoft
RESOURCE: This infographic reveals the best times for salespeople to send emails to potential customers. View now to see if your sales email strategy is wasting or maximizing time.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

Microsoft

Modern Infrastructure E-Zine – October 2015
sponsored by SearchDataCenter.com
EZINE: The October 2015 issue of our Modern Infrastructure e-zine is here, and it brings to the table a variety of interesting topics. Discover insights on thinking out, not up; explore data-aware storage; delve into the shortcomings of email, and more.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

SearchDataCenter.com
1 - 25 of 238 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement