Business of Information Technology  >   Business Processes  >   Business Communications  >  

e-Mail (Communications)

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail (Communications)Reports
 
Consulting Firm Locates, Migrates and Eliminates PST Files
sponsored by C2C Systems
VIDEO: This important video details the personal storage file migration solution one company used for a simple process.
Posted: 10 Jul 2014 | Premiered: 28 Apr 2014

C2C Systems

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

CommVault Edge™ Mobile App Demo: Sharing on the Go
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Check out this brief webcast to find out how this mobile app can help you take your work anywhere.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

CommVault Systems, Inc.

Developing an Information Governance Strategy
sponsored by Rand Secure Data
WHITE PAPER: Find out how developing an information governance strategy can help you manage unstructured data – and prevent trouble in the future.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

Rand Secure Data

The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012

Websense

Solution Overview: EMC VSPEX Proven Infrastructure for Virtualized Microsoft Exchange 2010
sponsored by FusionStorm
WHITE PAPER: This informative resource details how a consolidated and virtualized Exchange environment can satisfy the needs of a geographically distributed and mobile workforce.
Posted: 30 May 2013 | Published: 30 May 2013

FusionStorm

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Enterprise Messaging That Is Agile, Simple, and Efficient: Deploy Microsoft Exchange Server 2010 on Cisco UCS
sponsored by Insight
WHITE PAPER: The resource outlines a combined refresh and upgrade strategy for Exchange Server 2010 that improves efficiency and agility of your messaging environment while reducing costs and complexity by converging your email infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Insight

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement