Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

e-Mail Administration

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Administration Reports
 
The Top Five Office 365 Features
sponsored by Mimecast
EGUIDE: In this exclusive e-guide, our Exchange experts round up the top Office 365 features. Discover how to strengthen your critical communication apps in 5 different ways.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

Mimecast

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Stop Spear Phishing in its Tracks
sponsored by Cloudmark
VIDEO: In a recent survey, 84% of companies said spear phishing attacks got through their defenses. Is your email security prepared to handle sophisticated spear phishing attacks? In this video, explore how hackers successfully land attacks and how you can bolster your email defenses.
Posted: 21 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks
sponsored by Cloudmark
RESOURCE: Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.
Posted: 18 Jan 2016 | Published: 06 Jan 2016

Cloudmark

Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

Advanced threat protection add-on comes to Microsoft EOP
sponsored by Symantec Corporation
EGUIDE: This e-guide explores what advanced threat protection (ATP) can do for your cloud-based email tools. Protect end users against unknown malware and viruses and get real-time, time-of-click protection against malicious URLs.
Posted: 06 Jun 2016 | Published: 23 May 2016

Symantec Corporation

IT Services: A Management model for CIOs
sponsored by CenterBeam
EGUIDE: This expert e-guide explains how IT services and managed service providers (MSPs) deliver strategic value to the organizations that use them, and offers tips for choosing the right MSP. Also inside, learn why savvy CIOs are flocking to cloud computing.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

CenterBeam

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Solution Overview: EMC VSPEX Proven Infrastructure for Virtualized Microsoft Exchange 2010
sponsored by FusionStorm
WHITE PAPER: This informative resource details how a consolidated and virtualized Exchange environment can satisfy the needs of a geographically distributed and mobile workforce.
Posted: 30 May 2013 | Published: 30 May 2013

FusionStorm
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement