Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

e-Mail Management

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Management Reports
 
Survey Reveals Spear Phishing as Top Security Concern of Enterprises
sponsored by Cloudmark
RESOURCE: This infographic looks in finer detail at the repercussions of a top enterprise security concern: spear phishing. View now to learn the damages and costs your organization may face if email security is ignored.
Posted: 21 Jan 2016 | Published: 04 Dec 2015

Cloudmark

Malicious Email Files: The Growing Digital Weapon
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Check Point Software Technologies Ltd.

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015

Mimecast

7 Lessons Learned from an Office 365 Migration
sponsored by Mimecast
EGUIDE: In this exclusive e-guide, find out what one expert learned during his company's migration to Office 365. Discover how to avoid mistakes with these 7 lessons.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Mimecast

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

What to Know About Exchange 2013 and Load Balancing
sponsored by KEMP Technologies
WHITE PAPER: This whitepaper examines the changes in Exchange 2013, mainly focusing on load balancing and reverse proxy capabilities.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

University Improves Learning with Cloud Messaging
sponsored by Dimension Data
WHITE PAPER: In this case study, explore how a university with a large, diverse student and staff population updated their ageing, legacy email system with a cloud messaging solution.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Dimension Data

The Case for Hosted Exchange
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.
Posted: 05 Mar 2014 | Published: 20 Oct 2013

Intermedia.Net

Resilient, Stable, Scalable and Flexible IT Infrastructure for Exchange 2010
sponsored by Hitachi Data Systems
WHITE PAPER: This informative paper explores a converged platform for Microsoft Exchange 2010 that's engineered for rapid deployment and tightly integrated with powerful new features in Microsoft Exchange 2010 for resilience, predictable performance and seamless scalability. Read on now to learn more.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Hitachi Data Systems

How Cisco IT Deployed Enterprise Messaging on Cisco UCS
sponsored by Insight
CASE STUDY: Access this case study to examine how one organization leveraged consolidation in their Exchange environment to optimally support the latest Exchange upgrade. Learn more about the results realized, lessons learned and next steps towards effective Exchange operations.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Insight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement