Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Mailbox Management

RSS Feed    Add to Google    Add to My Yahoo!
Mailbox Management Reports
 
Streamlining and Securing Email Infrastructure
sponsored by SilverSky
WHITE PAPER: This white paper details how United Airlines was able to secure and streamline its email messaging infrastructure, giving their staff secure access to email at home and on the road.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

SilverSky

CIO Spotlight 3 Ways a Next-generation Email Archive Delivers True Business Value
sponsored by Commvault
WHITE PAPER: Access this white paper to find out why it is crucial for CIOs to implement an enterprise-class email archiving system. Read on to learn how email archiving not only protects data, but also plays a key role in reaching overall business value objectives.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Commvault

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

How Secure Are Your Exchange Setups?
sponsored by Rackspace
EGUIDE: In this exclusive e-guide, discover an 8 step Exchange phishing security test to ensure that you're not the next breach victim.
Posted: 22 Jun 2015 | Published: 04 Jun 2015

Rackspace

Improving Collaboration by Adding Social Capabilities to Email
sponsored by IBM
WHITE PAPER: Consult the following white paper to uncover how social software has affected the reality of email as we know it. Learn what challenges are surfacing, what technology is available to help, and more.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WHITE PAPER: This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them.
Posted: 05 May 2014 | Published: 09 May 2013

Dell Software

Ontrack PowerControls: Email Management in Today's Regulatory Environment
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This white paper presents a way to more easily restore individual messages, mailboxes, attachments, and contacts from a previous full backup or snapshot without modifying your Exchange environment or normal backup procedures. Learn how to overcome the biggest Exchange backup problems you've been struggling with.
Posted: 10 Jul 2012 | Published: 31 Dec 2011

Kroll Ontrack, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement