Business of Information Technology  >   Business Processes  >   Business Communications  >  

e-Mail (Communications)

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail (Communications) Reports
 
Mimecast Mailbox Continuity for Office 365
sponsored by Mimecast
DATA SHEET: This data sheet details an email backup solution that is specially tooled to preserve enterprise functionality, especially for Office 365.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Mimecast

Mimecast Legacy Archive Data Management for Office 365
sponsored by Mimecast
DATA SHEET: This datasheet discusses preserving your institutional memory while freeing up your storage resources by moving your emails into secure cloud storage.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Mimecast

Information Security magazine: Insider Edition
sponsored by SearchSecurity.com
EZINE: Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing perimeter and bring on board the best new security tools to protect your enterprise.
Posted: 10 May 2016 | Published: 10 May 2016

SearchSecurity.com

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

How to Prepare for Exchange 2016, SharePoint 2016 and Office 365
sponsored by Dell Software
WHITE PAPER: This white paper digs into the first area of Exchange 2016, SharePoint 2016, and Office 365 migration preparation – inventory and assessment – by showing you how to gain deep insight into your entire legacy environment and remediate issues before the migration starts.
Posted: 10 May 2016 | Published: 10 May 2016

Dell Software

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Everything You Need to Know about Enterprise Mobility Management
sponsored by CA Technologies.
EBOOK: Enterprise mobility management (EMM) strategies encompass several challenging problems for IT. From meeting the ever-increasing demands of end-users and the mobile devices they own, to security and threat risks, there is a lot to know about EMM.
Posted: 18 Sep 2014 | Published: 11 Sep 2014

CA Technologies.

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement