Business of Information Technology  >   Business Processes  >   Business Communications  >  

e-Mail (Communications)

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail (Communications) Reports
 
Stagnate or Automate: How to Make the Right File Transfer Choices
sponsored by Ipswitch File Transfer
WHITE PAPER: In this white paper, discover the dilemma between stagnating or automating technologies, and which one is better for handling file transfers.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Business Reimagined
sponsored by ComputerWeekly.com
BOOK: Reimagining business is about waking up to a new environment based on technology that liberates rather than constrains, writes Dave Coplin.
Posted: 26 Jun 2013 | Published: 28 Jun 2013

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

University Improves Learning with Cloud Messaging
sponsored by Dimension Data
WHITE PAPER: This resource tells the story of a university struggling with their e-mail system and the solution they chose.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Dimension Data

Uncovering the Cost of Email
sponsored by Message Bus
WHITE PAPER: This white paper examines the traditional costs of building, sending, and maintaining feature rich email.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Message Bus

Breaking BYOD: Exploring Mobile Alternatives
sponsored by SearchConsumerization.com
EBOOK: Enterprise mobility management (EMM) strategies encompass several challenging problems for IT.  From meeting the ever-increasing demands of end-users and the mobile devices they own, to security and threat risks, there is a lot to know about EMM.
Posted: 11 Sep 2014 | Published: 11 Sep 2014


Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Medium Delivers Millions of Emails with Message Bus
sponsored by Message Bus
WHITE PAPER: View this brief resource to learn about one email platform that follows email best practices to help you maintain your reputation. Read on now to learn how the platform scales seamlessly without impacting delivery, provides you with real time performance on each stream, and how it fits into your organization.
Posted: 06 Jan 2015 | Published: 01 Dec 2014

Message Bus

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Longline Phishing: A New Class of Advanced Phishing Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, gain valuable information about longlining, the newest method in phishing attacks, and key recommendations for how to enhance your email security defense.
Posted: 28 Oct 2013 | Published: 31 Dec 2012

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement