Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed   
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 

Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Email Reports
1 - 25 of 201 Matches Previous Page  |  Next Page
Proofpoint Information Protection Research Team
sponsored by Proofpoint
RESOURCE: Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Is Group Chat Still Cutting It?
sponsored by Igloo, Inc
WHITE PAPER: View this white paper to discover how group chat has impacted the modern day workplace. Explore the differences between group chat and email, and decide if a real-time, group chat application is right for your organization.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Igloo, Inc

Who will win the world's biggest cloud contract?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

The Complete Guide to G Suite Email Protection for IT and Security Leaders
sponsored by Virtru
WHITE PAPER: A mistaken reply all or forward can cost millions. And for executives with more sensitive and valuable information stored in their inboxes, the stakes are even higher.This guide explains the strategic drivers around the need for email encryption and outlines the best available options for organizations that use G Suite. Read on to learn more.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Virtru

Conversational Geek Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Mimecast

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Transform Customer Service with Next-Gen Knowledge
sponsored by eGain Communications Corp.
WHITE PAPER: In this white paper, discover key attributes to look for in your KM system (and the solution provider) to maximize your odds of success.
Posted: 26 Jul 2019 | Published: 26 Jul 2019

eGain Communications Corp.

Beyond The Phish: 2019 Report
sponsored by Proofpoint
WHITE PAPER: In Proofpoint's 2019 Beyond the Phish report, explore user knowledge of a broad range of best practices for cyberhygiene, security and compliance. The report analyses millions of responses gathered from their Security Education Platform.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Proofpoint

Business Email Compromise Attack Evolution and Prevention
sponsored by Blackberry Cylance
WEBCAST: In this webinar, Cylance Consulting Director Sig Murphy presents a comprehensive overview of the origins of business email compromise and evolving attack trends, providing you the information needed to proactively defend systems and endpoints from future attacks.
Posted: 02 Jul 2019 | Premiered: Jul 2, 2019

Blackberry Cylance

Telit Challenges Security Controls with Cymulate's Breach & Attack Simulation
sponsored by Cymulate
CASE STUDY: In this case study, Telit utilizes Cymulate's breach and attack modules for the most common cyberattack vector, incoming email, and also the Hopper (Lateral Movement) module that finds gaps within an enterprise's domain.
Posted: 01 Jul 2019 | Published: 01 Jul 2019

Cymulate

Top 10 Reasons Customers Choose Proofpoint to Protect Office 365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Download this infographic for the top 10 reasons why customers choose Proofpoint to protect Office 365.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Proofpoint

Why Mimecast Web Security?
sponsored by Mimecast
RESOURCE: In this infographic, find out how Mimecast Web Security can help your organization defend against advanced phishing and malware attacks that come via email, web, instant messaging systems, social network sites, and ad networks.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Mimecast

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Many organizations think their current email security systems are up to the task of protecting them from phishing. Unfortunately, many of them fall short and don't keep their organizations safe. In this report, uncover research from Mimecast's study on the amount of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Mimecast

Common Office 365 Email Security Issue: Phishing
sponsored by Inky Technology
RESOURCE: Discover the common Office 365 email security attacks that have been infiltrating businesses emails.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Inky Technology

Internal Threats Personified: How Employees Can Jeopardize Your Cybersecurity
sponsored by Mimecast
EBOOK: Your employees can be your greatest asset, or your weakest link when it comes to email security. In this e-book, find several email-related activities that employees often engage in that contribute to the spread of these insider (hidden) threats and discover what your organization can do to protect itself.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE: In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET: Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

Understanding Email Fraud
sponsored by Proofpoint
ANALYST REPORT: Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

End User Applications Datasheet
sponsored by Mimecast
DATA SHEET: Email is a core business application and remains the number one form of business communication. Mimecast's apps play a key role in delivering the email experience employees expect and supporting IT in safeguarding the enterprise. Download this data sheet to learn about the key benefits of Mimecast's suite of productivity apps today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Case Review App Datasheet
sponsored by Mimecast
DATA SHEET: Learn how you can streamline first-pass review for email to improve e-discovery effectiveness and reduce costs using the Mimecast Case Review App.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Web Security Datasheet
sponsored by Mimecast
DATA SHEET: Mimecast Web Security is integrated with Mimecast's Secure Email Gateway with Targeted Threat Protection, helping customers consolidate protection using a single, cloud-based service that protects against the two most dominant cyberattack vectors: email and the web. Download this datasheet to learn more about Mimecast's key capabilities.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Mimecast Web Security
sponsored by Mimecast
PRODUCT OVERVIEW: In this solution brief, discover how Mimecast Web Security can help protect against malicious web activity initiated by user action or malware and block business inappropriate websites.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

2019 Threat Report: Email Fraud in Financial Services
sponsored by Proofpoint
RESEARCH CONTENT: Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Proofpoint

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Trend Micro, Inc.
RESEARCH CONTENT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 21 May 2019 | Published: 16 May 2019

Trend Micro, Inc.
1 - 25 of 201 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement