Business of Information Technology  >   Business Processes  >   Business Communications  >  

e-Mail (Communications)

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail (Communications) Reports
 
Expert: "Web app design at the core of coding weaknesses, attacks"
sponsored by GeoTrust, Inc.
EGUIDE: Access this expert eGuide to learn how rethinking coding practices can fix glitches that cause security weaknesses. Read on for an in-depth perspective of how coding can impact cyber-attack prevention.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.

Cloud Efficiencies and Hosted Email
sponsored by Apptix
EGUIDE: This whitepaper covers some information about cloud computing and dispels some myths about hosted Exchange email.
Posted: 25 Apr 2014 | Published: 25 Apr 2014

Apptix

The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012

Websense

Solution Overview: EMC VSPEX Proven Infrastructure for Virtualized Microsoft Exchange 2010
sponsored by FusionStorm
WHITE PAPER: This informative resource details how a consolidated and virtualized Exchange environment can satisfy the needs of a geographically distributed and mobile workforce.
Posted: 30 May 2013 | Published: 30 May 2013

FusionStorm

Top 5 Reasons You Should Dump Your In-House Email Infrastructure
sponsored by Message Bus
EGUIDE: Access this expert e-guide to find 5 reasons why you should dump your in-house email infrastructure.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Message Bus

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Product Review - C2C PST Enterprise
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores a solution that allows for businesses to bring the value of historical PST files back to the forefront within the Exchange or Office 365 environment. Learn how to configure and deploy this solution, how to avoid obstacles, and more.
Posted: 19 May 2014 | Published: 19 May 2014

C2C Systems UK

What to Know About Exchange 2013 and Load Balancing
sponsored by KEMP Technologies
WHITE PAPER: This whitepaper examines the changes in Exchange 2013, mainly focusing on load balancing and reverse proxy capabilities.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement