Business of Information Technology  >   Business Processes  >   Business Communications  >  

e-Mail (Communications)

RSS Feed   
e-Mail (Communications) Reports
 
The Rise of Spear Phishing Attacks & Email Fraud
sponsored by Barracuda
EGUIDE: Almost half of UK organizations have been compromised in the past two years using phishing attacks, despite high levels of cyber awareness and training, research shows. Download this e-guide to learn about the rise of phishing and email security, today.
Posted: 26 Apr 2019 | Published: 19 Apr 2019

Barracuda

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

The Case for Hosted Exchange
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.
Posted: 05 Mar 2014 | Published: 20 Oct 2013

Intermedia.Net

Product Review - C2C PST Enterprise
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores a solution that allows for businesses to bring the value of historical PST files back to the forefront within the Exchange or Office 365 environment. Learn how to configure and deploy this solution, how to avoid obstacles, and more.
Posted: 19 May 2014 | Published: 19 May 2014

C2C Systems UK

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Improving the Success of Your Enterprise's Email Marketing Campaigns
sponsored by Teradata
WHITE PAPER: This document outlines some of the standard best practices that can enhance email communications, including: segmentation, personalization, mobile optimization, and landing pages. It also includes mistakes to avoid to increase customer loyalty and nurture incoming leads.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Teradata
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info