Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

e-Mail Administration

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail AdministrationReports
 
Understanding Advanced Persistent Threats and Complex Malware
sponsored by Dell SecureWorks UK
WEBCAST: Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks UK

Optimizing Microsoft Exchange in the Enterprise: Optimizing the Mailbox Server Role and the Client Access Server
sponsored by Global Knowledge
WHITE PAPER: Access part one in a two part series on optimizing Exchange Server 2010 in the enterprise. Uncover details about the advanced features of the mailbox and client access servers along with simple tips and tricks for improving your Exchange environment.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Global Knowledge

CallPilot Manager - Server Settings Link
sponsored by Global Knowledge
WHITE PAPER: One of the most underused links within Avaya CallPilot Manager is the Server Settings. link. With this link you can complete a number of tasks - read this whitepaper to learn what!
Posted: 07 May 2013 | Published: 19 Apr 2013

Global Knowledge

Cisco UCS C-Series Rack Servers with Intelligent Intel Xeon Processors for Microsoft Exchange Server
sponsored by Insight
WHITE PAPER: This solution brief details the features and benefits of an innovative rack server series and discusses the benefits of running Exchange on this architecture. Read on to determine if this is an optimal hardware for your messaging and collaboration environment.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Insight

Presentation Transcript: Best Practices for Unified Communications Migrations and Management
sponsored by Dell Software
PRESENTATION TRANSCRIPT: In this presentation, Joel Blaiberg, author of “Four Steps to Planning a Successful Migration” shares key migration strategies, and best practices that can save your organization time and money when migrating communications to Office 365 or an on-premises or a hybrid environment.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

Dell Software

Best Practices: Dell Compellent Storage Center Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WHITE PAPER: This comprehensive whitepaper serves as a best practice guideline when configuring and using Microsoft Exchange Server 2010.
Posted: 22 Oct 2013 | Published: 26 Jan 2012

Dell, Inc.

Mail Attender, Archive Attender, Discovery Attender & PST Backup Attender
sponsored by Sherpa Software
WHITE PAPER: Although Microsoft introduced a number of features designed to accommodate the Exchange 2010 larger inbox size, your business may require a more sophisticated approach to retention policies, content management or searching. This white paper reveals software that supplements Microsoft Exchange 2010 Deployment and expands administrative control.
Posted: 23 May 2011 | Published: 23 May 2011

Sherpa Software

Removing the Risks and Complexities of Business Email Management
sponsored by Iron Mountain
DATA SHEET: Email is central to all organizations and has become the most essential business application of all. As a result, the ability to continuously protect, store, manage and archive great volumes of email is now a key business issue; Iron Mountain's Total Email Management Suite is the answer.
Posted: 07 Jun 2013 | Published: 03 Jun 2009

Iron Mountain

Creating and Enforcing Email Security Policies
sponsored by OpenText
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

OpenText

Email Security in the Cloud: More Secure! Compliant! Less Expensive!
sponsored by McAfee, Inc.
ANALYST BRIEF: Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.
Posted: 08 Aug 2011 | Published: 01 Apr 2010

McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement