Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed   
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 

Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Email Reports
1 - 25 of 183 Matches Previous Page  |  Next Page
Which Product Is Best for Your Customers?
sponsored by TechData - Microsoft
WHITE PAPER: Learn about the Cloud Solution Provider from Tech Data, designed to help you maximize your relationship with customers and generate new revenue opportunities from your Office 365 business.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

TechData - Microsoft

Office 365 Email Security and Resilience
sponsored by Mimecast
EBOOK: If your current email security doesn't fit your risk profile, consider a third-party platform. Download this guide to help you choose carefully among the many third-party platforms out there.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

Internal Threats Personified
sponsored by Mimecast
WHITE PAPER: When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

The State of Email Security
sponsored by Mimecast
EBOOK: In this e-book, The State of Email Security, take a closer look at the latest trends in impersonation attacks and ransomware to learn how you can strengthen your security defense strategy today.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Mimecast

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Moving to Microsoft Office 365 has many benefits such as ubiquitous data access and overall agility. But, moving email to this cloud environment can expose your organization to a wide range of security risks. In this white paper, learn what to look for in a third-party security platform to help your organization avoid these security challenges.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Mimecast

Email Security Risk Assessment
sponsored by Mimecast
RESEARCH CONTENT: Many email security systems today fall short and do not keep their organizations safe. In fact, the proof is in the numbers. Download the Email Security Risk Assessment to see how Mimecast discovered the number and type of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 12 Apr 2019 | Published: 12 Apr 2019

Mimecast

Forcepoint Web Security Cloud and Email Security Cloud: Analyst Report
sponsored by Forcepoint
ANALYST REPORT: In this Forrester Total Economic Impact report, discover a framework to evaluate the potential financial impact of Forcepoint's Web Security Cloud and Email Security Cloud on your organization today.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Forcepoint

Phish Phinder: Tell-Tale Signs of a (Potentially) Successful Email Phishing Scam
sponsored by Avast Software
RESOURCE: Email phishing scams are often successful and can put your organization at major risk with stolen credentials and credit card information. In this infographic, discover tips and tricks for detecting a potentially successful email phishing scam today.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Avast Software

7 Ways to Spot a Business Email Compromise in Office 365
sponsored by Expel
RESOURCE: Many people think that BEC is only associated with wire transfer fraud, but the reality is that BEC is much more than that. It's really an umbrella term that includes things like W2 scams, real estate scams, lottery scams and more.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Expel

Isolate Advanced Email Attacks
sponsored by Symantec
PRODUCT OVERVIEW: Traditional email security platforms can sometimes be ineffective against suspicious links that use techniques such as multiple redirects, shortened URLs, or time-based delays to evade detection. In this product brief, learn about a platform that can help isolate advanced email attacks like these today.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Symantec

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks

Streamlining Operations with Centralized, Searchable Knowledge Bases
sponsored by Wrike
WHITE PAPER: Centralized knowledge bases can be a lifesaver for IT teams and users alike. Find out how a large-scale furniture provider built an IT helpdesk and searchable knowledge base to support over 19 warehouse and showroom locations, even integrating G Suite tools for maximum efficiency.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Wrike

Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

The Definitive Guide to Engaging Email Marketing
sponsored by Marketo
RESOURCE: In this 156-page email marketing guide, uncover the 5 attributes of engaging email, which will help you tell richer and more compelling stories within your email marketing and beyond.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Marketo

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

2018 Beyond the Phish Report
sponsored by Proofpoint
ANALYST REPORT: In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.
Posted: 09 May 2018 | Published: 09 May 2018

Proofpoint

Communicating in Crisis: How Preparedness Leads to Successful Crisis Management
sponsored by OnSolve
WHITE PAPER: This white paper details the many complexities involved with emergencies and how disaster planning requires a consistent, conscious approach for maximum preparedness and effectiveness.
Posted: 03 May 2018 | Published: 31 Dec 2017

OnSolve

10 Ways to Improve Your Employee Notification System
sponsored by OnSolve
WHITE PAPER: In this white paper, learn 10 key strategies for improving your notification system and alert response rates for the public as well as your employees.
Posted: 03 May 2018 | Published: 31 Dec 2017

OnSolve

The Role of Crisis Communication in Business Continuity and Disaster Recovery
sponsored by OnSolve
WHITE PAPER: When a corporate crisis strikes, communication, whether internal or external, must be immediate and clear. This paper explores the challenge of modern crisis communication, from creating and controlling the message to determining who should deliver it, and how you can improve your strategies before after a disaster.
Posted: 01 May 2018 | Published: 31 Dec 2017

OnSolve

Why Today's Organizations Need an Emergency Notification System
sponsored by OnSolve
WHITE PAPER: An emergency notification system (ENS) is essential for the health of your business when disaster strikes. This white paper covers the importance of an ENS and key benefits.
Posted: 30 Apr 2018 | Published: 30 Apr 2018

OnSolve

The True Cost of Waiting: How Not Having an emergency Notification System Hurts Businesses
sponsored by OnSolve
WHITE PAPER: In this white paper, learn the risks associated with not having an emergency notification system at your business – plus, the benefits that come with emergency preparedness when disaster strikes.
Posted: 30 Apr 2018 | Published: 30 Apr 2018

OnSolve

Conversational Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: This e-book is designed to help you explore the tools and features of Office 365 from both a user and administrator perspective. Then, read on to learn how you can mitigate the risk to your platform.
Posted: 28 Feb 2018 | Published: 31 Dec 2017

Mimecast

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

6 Customer Service Channels You Need to Support
sponsored by Freshworks
EGUIDE: Inside this e-guide, you'll uncover the importance of economic supply and demand and an overview of the pros and cons of 6 customer service channels to improve customer experience.
Posted: 12 Jun 2018 | Published: 06 Jun 2018

Freshworks

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.
1 - 25 of 183 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement