Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
1 - 25 of 276 Matches Previous Page  |  Next Page
Evaluation Report: Microsoft Exchange for the Small-to-Medium Business on HPE MSA 2040 Storage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines a storage system designed to ensure the highest performance and resilience for Exchange in small to midsized businesses. Read on to learn why research group, Demartek, recommends that business seeking to deploy email storage in a cost effective manner give this option serious consideration.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

Hewlett Packard Enterprise

Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

The Many Benefits of Email Security Gateways
sponsored by ZixCorp
EGUIDE: This e-guide examines the benefits of email security gateways. Beyond just preventing malicious email, gateways have a plethora of other benefits including DLP and BYOD security.
Posted: 07 Jun 2016 | Published: 31 May 2016

ZixCorp

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning on today's bot battlefield takes time, expertise, and a dedicated team. Get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

How to Successfully Migrate to Office 365
sponsored by CDW
RESOURCE: It can be challenging and disruptive to migrate all company email, files, and users to Microsoft Office 365. Explore a step-by-step process to help make your migration to Office 365 a success. Discover how Evans Food Group was able to cost-effectively deploy Office 365.
Posted: 12 May 2016 | Published: 09 Nov 2015

CDW

Donald J Pliner Seamlessly Migrates Email to the Cloud
sponsored by CDW
CASE STUDY: A footwear company needed a way to migrate their email and productivity apps from on-premises to a cloud data center. Explore the strategy that enabled them to find a licensing plan that fit their needs for the least amount of money. Learn how they were able to make their email migration easier while still maintaining control over the process.
Posted: 11 May 2016 | Published: 31 Dec 2015

CDW

Information Security magazine: Insider Edition
sponsored by SearchSecurity.com
EZINE: Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing perimeter and bring on board the best new security tools to protect your enterprise.
Posted: 10 May 2016 | Published: 10 May 2016

SearchSecurity.com

How to Prepare for Exchange 2016, SharePoint 2016 and Office 365
sponsored by Dell Software
WHITE PAPER: This white paper digs into the first area of Exchange 2016, SharePoint 2016, and Office 365 migration preparation – inventory and assessment – by showing you how to gain deep insight into your entire legacy environment and remediate issues before the migration starts.
Posted: 10 May 2016 | Published: 10 May 2016

Dell Software

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp

Comprehensive Security for Cloud-based Email
sponsored by Symantec Corporation
WHITE PAPER: Understand today's biggest cloud threats – including overlooked security issues lurking in commonly used cloud-based productivity apps – and accurately assess how much protection your cloud needs.
Posted: 10 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Building the Business Case for Email Archiving
sponsored by ArcMail Technology
EGUIDE: Access this expert e-guide to find out how to reduce risk associated with unchecked data, lower your total cost of ownership while improving performance and simplicity of operations, as well as consolidate control. Also explore the facets to look for in an email archiving tool.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

ArcMail Technology

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Top 5 Considerations in Choosing a Third-Party Solution for Email Archiving
sponsored by ArcMail Technology
WHITE PAPER: Discover 5 key considerations for choosing an email archiving tool, including ease of use/ease of deployment, compliance and e-discovery, storage management and server performance, and 2 more.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

ArcMail Technology

Keeping Email Vulnerability at Bay
sponsored by ArcMail Technology
WHITE PAPER: Access this CIO Review article to learn how email archiving is becoming a common way to fight data theft in enterprises today. Explore email archiving market trends and needs, how to ensure cost effective, continuous security, and more.
Posted: 27 Apr 2016 | Published: 06 Apr 2016

ArcMail Technology

The Impact of the New FRCP Amendments on Your Business
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, revisit the changes to the Federal Rules of Civil Procedure and what the implications are for your organization's email storage and compliance policies.
Posted: 15 Apr 2016 | Published: 31 Jan 2007

ArcMail Technology

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 email security and ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Email Archiving vs. Destructive Retention Policies
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
1 - 25 of 276 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement