Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
1 - 25 of 259 Matches Previous Page  |  Next Page
The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it: eliminated false positive message classification, reduced IT help tickets, improved general email security, and assumed granular control over spam and bulk mail classification within Office 365.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Sync, Send and Receive: Why Cloud-Based Email and Storage Make Business Sense
sponsored by Microsoft
WHITE PAPER: Your business may not be enormous, but the amount of information you generate—even in one day—can be. Read on to discover how SMBs that adopt cloud-based email and storage will reduce their operational costs, increase productive collaboration with strategic use of IT staff, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Microsoft

The PM Challenges of Email, Excel Spreadsheets and Desktop Folders
sponsored by Cerri.com AG
WHITE PAPER: Email inboxes, spreadsheets, and desktop folders are considered old school tools when it comes to project management. Sure, they still work in some cases, but you'll never be able to grow your company beyond these tools' capabilities. This white paper examines the pros and cons of the old tools and compares them to project management software.
Posted: 07 Nov 2016 | Published: 31 Dec 2015


Email Security Best Practices to Help Avoid Downtime
sponsored by Rackspace
WHITE PAPER: This white paper aims to provide a deeper understanding of the factors that can impact your current email solution's security risks and unplanned downtime, as well how to help you better compare and evaluate your current email solution with that of a newer version.
Posted: 31 Oct 2016 | Published: 01 Sep 2016

Rackspace

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This infographic reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast
WHITE PAPER: To solve mailbox bloat, CIOs are turing to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Combat the Most Common Forms of Phishing Attacks
sponsored by Agari
WHITE PAPER: Learn the behaviors of, and remedies for, 6 of the top phishing attacks that are targeting enterprises in ever increasing numbers.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Agari

How to Create Highly Effective Email Marketing
sponsored by Marketo
EBOOK: This ebook explains how you can craft 10 different types of marketing emails to create the most customer engagement possible. You'll learn the best time to send abandoned-cart emails, how much information to include in your new subscriber emails, what it takes to build lasting relationships with your customers, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Marketo

The Modern State of Email and How To Increase Your Deliverability
sponsored by Marketo
WHITE PAPER: In this white paper, explore what drives modern email deliverability and learn some best practices for crafting an engaging email. Discover Gmail's new tabbed inbox filters, how to write subject lines with important "trigger words" and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Marketo

The Importance of Proactive Risk Management in Email Security
sponsored by Agari
WHITE PAPER: Business email compromise (BEC) scams are becoming more sophisticated. Access this executive brief to keep ahead of the curve and learn how to mitigate the risks of the newest breed of BEC attacks while gaining deep insight into your email ecosystem.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

Agari

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia

Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO: Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016

Proofpoint, Inc.

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

Top Email Marketing Blunders and How to Avoid (and Recover From) Them
sponsored by Marketo
EBOOK: This ebook reviews the potential blunders marketers make in their email marketing campaigns, why those blunders make a difference, and how to prevent (and fix) these types of mistakes.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Marketo

The Definitive Guide to Engaging Email Marketing
sponsored by Marketo
WHITE PAPER: Generic emails are a good way to alienate potential leads. Email marketing needs to be as engaging as possible in a market which bombards customers on a daily basis. Access this comphrensive guide to create the most engaging email marketing strategy possible.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Marketo

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Enable secure mobile collaboration for your business
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 259 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement