Business of Information Technology  >   Business Processes  >   Business Communications  >  

e-Mail (Communications)

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail (Communications) Reports
 
Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

Connect With Confidence: Three Steps to Stopping Advanced Email Threats
sponsored by Proofpoint, Inc.
RESOURCE: Your brand may be at risk. Ransomware, business email compromise, and credential phishing may be bypassing your security defenses. Check out this infographic to protect your organization from cyberattacks with 3 steps to fight back.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: Discover how you can accurately collect and examine threat intelligence to prevent phishing schemes from infecting your network. Gain knowledge and insight into malicious actors so you can prevent future, possibly business-crippling, attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

The Many Paths to Exchange 2013
sponsored by SearchExchange.com
EBOOK: While the benefits are appealing, an upgrade to the latest version of Exchange is a big step. The complexity of that migration will depend on your starting point and the thoroughness of your plan.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

SearchExchange.com

University Improves Learning with Cloud Messaging
sponsored by Dimension Data
WHITE PAPER: In this case study, explore how a university with a large, diverse student and staff population updated their ageing, legacy email system with a cloud messaging solution.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Dimension Data

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement