Research Library

Powered by

Email Management Research

  • Creating and Enforcing Email Security Policies

    Sponsored by:

    This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.

  • Business Reimagined

    Sponsored by:

    Reimagining business is about waking up to a new environment based on technology that liberates rather than constrains, writes Dave Coplin.

  • C2C PST Enterprise vs. Microsoft PST Capture

    Sponsored by: C2C Systems UK

    In this informative resource, compare two PST management and elimination tools -- C2C PST Enterprise and Microsoft PST Capture -- to see which fits best with the needs of your organization.

  • What to Know About Exchange 2013 and Load Balancing

    Sponsored by: KEMP Technologies

    This whitepaper examines the changes in Exchange 2013, mainly focusing on load balancing and reverse proxy capabilities.

  • Take Control of Your PST Problem

    Sponsored by: Dell Software

    Find out best practices for migrating PST file data to a more secure Exchange or Office 365 environment, and get suggestions for tools that can help ensure your migration is successful. Read the White Paper >>

  • Mastering Exchange Migrations: Controlling the Top 10 Critical Issues

    Sponsored by: Dell Software

    This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them.

  • Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD

    Sponsored by: ZixCorp

    This expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.

  • Cloud Efficiencies and Hosted Email

    Sponsored by: Apptix

    This whitepaper covers some information about cloud computing and dispels some myths about hosted Exchange email.

  • Cisco Email Security

    Sponsored by: Cisco

    This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.

  • Advanced Malware Protection for your Web and Email Gateways

    Sponsored by: Cisco Systems, Inc.

    This article explores the recent merger between one company's advanced malware protection and their web and email gateways.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

  • Ontrack® PowerControls™ 6.0: Managing Data in Server Environments

    Sponsored by: Ontrack® PowerControls™ by Kroll Ontrack

    Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange Server and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results.

  • The Many Paths to Exchange 2013

    Sponsored by:

    While the benefits are appealing, an upgrade to the latest version of Exchange is a big step. The complexity of that migration will depend on your starting point and the thoroughness of your plan.

  • The Case for Hosted Exchange

    Sponsored by: Intermedia.Net

    This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.

  • Exchange Object Recovery

    Sponsored by: PHD Virtual

    This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.

  • 24 Questions to Take the Migraine Out of Email Migration

    Sponsored by: Intermedia.Net

    This whitepaper features 24 questions you should ask as you try to select a service provider to execute your Exchange migration to the cloud.

  • The Master List of Email Delivery Terminology

    Sponsored by: Dyn

    Email may seem simple – create content and send to your list – but there are many elements that go into a good email program. The Master List of Email Terminology helps shed light on the terms that you should know and what you should be implementing in your own program.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos, Inc.

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Resilient, Stable, Scalable and Flexible IT Infrastructure for Exchange 2010

    Sponsored by: Hitachi Data Systems

    This informative paper explores a converged platform for Microsoft Exchange 2010 that's engineered for rapid deployment and tightly integrated with powerful new features in Microsoft Exchange 2010 for resilience, predictable performance and seamless scalability. Read on now to learn more.

  • Bloomberg Personal Vault

    Sponsored by: Bloomberg

    Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.

  • Best Practices: Dell Compellent Storage Center Microsoft Exchange Server 2010

    Sponsored by: Dell, Inc.

    This comprehensive whitepaper serves as a best practice guideline when configuring and using Microsoft Exchange Server 2010.

  • Automating SAP Order Processing is a Must

    Sponsored by: Esker Inc.

    To avoidissues caused by fax and email sales orders, many savvy companies are turning to automation technologies for help. In this resource, discover how an automated order processing platform works, and discover the benefits you could experience from paperless order processing.

  • SMART Guidance for Notes Migrations Webinar

    Sponsored by: BinaryTree

    Watch this video to discover more about e-mail migration and what you can do in order to make your transition a success. Inside you’ll learn about managing migration, impacts of non-integration, and more.

  • IT Services: A Management model for CIOs

    Sponsored by: CenterBeam

    This expert e-guide explains how IT services and managed service providers (MSPs) deliver strategic value to the organizations that use them, and offers tips for choosing the right MSP. Also inside, learn why savvy CIOs are flocking to cloud computing.

  • Case Study: US Airways

    Sponsored by: Message Systems

    In this case study, find out how US Airways maintained high levels of customer satisfaction with an automated messaging system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.