Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Administration

RSS Feed   
Email Administration Reports
 
Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by SearchSecurity.com
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

SearchSecurity.com

Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance.
Posted: 01 Aug 2011 | Published: 26 Jul 2011

SearchSecurity.com

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Improving Enterprise Email Security: Systems and Tips
sponsored by SearchSecurity.com
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchSecurity.com

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

The Case for Hosted Exchange
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.
Posted: 05 Mar 2014 | Published: 20 Oct 2013

Intermedia.Net

Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.

C2C PST Enterprise vs. Microsoft PST Capture
sponsored by C2C Systems UK
WHITE PAPER: In this informative resource, compare two PST management and elimination tools -- C2C PST Enterprise and Microsoft PST Capture -- to see which fits best with the needs of your organization.
Posted: 16 May 2014 | Published: 16 May 2014

C2C Systems UK

Solution Overview: EMC VSPEX Proven Infrastructure for Virtualized Microsoft Exchange 2010
sponsored by FusionStorm
WHITE PAPER: This informative resource details how a consolidated and virtualized Exchange environment can satisfy the needs of a geographically distributed and mobile workforce.
Posted: 30 May 2013 | Published: 30 May 2013

FusionStorm
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement