Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
1 - 25 of 242 Matches Previous Page  |  Next Page
Augmenting security and management of Office 365 with Citrix XenMobile
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to securely deploy and manage Office 365, protect data at rest on mobile devices and protect data in transit. You'll also learn how to configure mobile apps with hosted Exchange and more.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Citrix

Consider a Move to Hyperconvergence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: You need to keep your email running efficiently at all times; that's where hyperconverged infrastructure (HCI) comes in to play. Access this white paper to learn about the intersection of these technologies and how HCI supports email applications like Exchange.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Hewlett Packard Enterprise

Get the most out of Office 365
sponsored by Citrix
RESOURCE: Download this resource to see how virtualization can help you overcome Office 365 migration challenges and achieve faster migration, easier maintenance, and increased security.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

Visual Collaboration: How to Attract Clients and Win the Day for Your Consulting Firm
sponsored by Bluescape
WHITE PAPER: Discover how to create new business with visual collaboration tools. Especially when managing increasingly mobile teams, find out what you can do to enhance collaboration pre- and post- sales, nurture long-term relationships with clients, improve upon collaboration techniques like email, and more.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Bluescape

3 Ways Visual Collaboration Helps Filmmakers Create Better
sponsored by Bluescape
WHITE PAPER: Explore how to revitalize collaboration with tools designed to promote productivity and better communication. Discover how creative professionals like filmmakers can use visual collaboration to improve upon technologies like email.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Bluescape

Office 365 Risk Mitigation
sponsored by Mimecast
WHITE PAPER: Read this white paper to discover suggestions to enhance the security of your Office 365. With the suggestions provided, determine which security tactics will improve your security posture.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

Advanced Email Security
sponsored by Proofpoint, Inc.
RESOURCE: Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing
sponsored by Proofpoint, Inc.
RESOURCE: Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.
Posted: 18 Aug 2017 | Published: 31 May 2017

Proofpoint, Inc.

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

The New Rules For Skills-Based Routing to Improve Your Customer Experience
sponsored by Mitel Networks Limited
VIDEO: Skills-based routing has been around for a long time, but now it has evolved to the point where it has become a key differentiator for contact centers looking to enhance their customer experiences. Learn how to redefine skills-based routing to filter interactions with customers via calls, email, web chat, and SMS.
Posted: 10 Aug 2017 | Premiered: 27 Jul 2017

Mitel Networks Limited

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for 4 best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Enterprise Phishing Susceptibility and Resiliency Report
sponsored by PhishMe
WHITE PAPER: Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

PhishMe

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Choosing a Unified Mobile and Cloud Security Platform
sponsored by MobileIron
RESOURCE: Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.
Posted: 24 May 2017 | Published: 24 May 2017

MobileIron

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY: Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Proofpoint, Inc.

Migration to Exchange Online and Office 365: A Step-by-Step Guide
sponsored by Quest
WHITE PAPER: Migrating to Office 365 and Exchange? If you haven't been part of a previous migration to Office 365, then you've got a steep learning curve ahead of you. Don't fret! Let this white paper be your guide as it takes you step-by-step and breaks down each step into its basic components to give you a smooth transition.
Posted: 24 Feb 2017 | Published: 30 Dec 2016

Quest

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 242 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement