e-Mail (Communications) Reports

Virtualizing your Exchange Server: Fact vs. fiction
sponsored by SearchDataCenter.com
EBOOK: Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

SearchDataCenter.com

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Agile software testing pioneer slams the door on C-level email attacks
sponsored by Barracuda
WHITE PAPER: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 08 Feb 2021 | Published: 07 Jun 2019

Barracuda

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

The Case for Hosted Exchange
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.
Posted: 05 Mar 2014 | Published: 20 Oct 2013

Intermedia.Net

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge
sponsored by Dell, Inc. and IntelĀ®
PRESENTATION TRANSCRIPT: This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape.
Posted: 25 Jan 2012 | Published: 25 Jan 2012

Dell, Inc. and IntelĀ®

Email Security Technical Guide
sponsored by SearchSecurity.com
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.