ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Research

  • Enterprise Case Study: Enabling a More Mobile Way of Working

    Sponsored by: Citrix

    Download this case study to see how one company was able to consolidate technologies to enable a more mobile way of working, and enhance employee productivity.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • 5 Biggest CIO Communications Problems, Solved

    Sponsored by: Microsoft

    IT overhauls in business productivity are necessary for your business to remain competitive and keep pace with the accelerating demands of today's connected world, but change can be disruptive. This e-book explores 5 key problems that CIOs face that often inhibit IT business leaders from implementing modern communications solutions.

  • CEO Fraud Prevention Manual

    Sponsored by: KnowBe4

    This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.

  • modusCloud Email Security URL Defense

    Sponsored by: Vircom

    Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.

  • Phishing is Big Business. Don't Get Hooked.

    Sponsored by: Sophos, Inc.

    91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • Confronting Today's Advanced Email Threats

    Sponsored by: Vircom

    Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.

  • The Current State of Email Security

    Sponsored by: Microsoft

    83% of IT security managers cited email as a primary source of attack. Access this white paper to learn about the current state of email security, where you stand in relation to your peers, and how you can prepare for future attacks.

  • Bring Focused Collaboration to Teams of Any Size

    Sponsored by: IBM

    Discover how to implement a secure, scalable, and flexible collaboration platform that provides a unified toolset for social networking, content management, chat, meetings, email, and more.

  • Malware Year in Review 2016

    Sponsored by: PhishMe

    Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.

  • Navigating The Evolving Threat Landscape with Network Security

    Sponsored by: TrendMicro

    Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.

  • Internet and Security Threat Report 2017

    Sponsored by: Symantec & Blue Coat Systems

    Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.

  • Enterprise Phishing Susceptibility and Resiliency Report

    Sponsored by: PhishMe

    Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.

  • Planning for Office 365 Gaps

    Sponsored by: Mimecast

    In this white paper, learn how to use third party offerings, and put a plan into action to keep your system safe from the 3 risks that Office 365 poses.

  • What do 200 IT Decision Makers Think of Office 365?

    Sponsored by: Mimecast

    In the fall of 2016, 200 IT decision makers from around the globe were interviewed by VansonBourne Research about their experience using Office 365 Exchange online in 4 areas. Read what they had to say by clicking inside.

  • Closing The Cloud Email Security Gap

    Sponsored by: Mimecast

    This Forrester Research Report surveys 220 IT pros tests the hypothesis that organizations are unaware of how at risk their cloud email systems are, and need to take extra steps to make sure their data remains secure.

  • How to Build an Enterprise Cybersecurity Plan

    Sponsored by: Fortinet, Inc.

    A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.

  • Choosing a Unified Mobile and Cloud Security Platform

    Sponsored by: MobileIron

    Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.

  • 10 Things You Need to Know About Ransomware

    Sponsored by: Cylance

    As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.

  • 5 Biggest CIO Communications Problems, Solved

    Sponsored by: Microsoft

    IT overhauls in business productivity are necessary for your business to remain competitive and keep pace with the accelerating demands of today's connected world, but change can be disruptive. This e-book explores 5 key problems that CIOs face that often inhibit IT business leaders from implementing modern communications solutions.

  • 10 Myths About Moving to the Cloud

    Sponsored by: Microsoft

    If your organization is considering making the move to Office 365 as one of your first steps in moving applications to hosted solutions you've probably encountered some misinformation in your research about the platform. Access this white paper to find 10 myths busted about Microsoft Office 365, and make an informed purchasing decision.

  • Bump Your Email Up To Business Class: How do you know it's time for business-grade email?

    Sponsored by: Microsoft

    As a growing volume of emails appear in workers' inboxes each day, employees need the best tools to streamline collaboration and maximize productivity. Discover an enterprise class technology that can help organizations work smarter with secured access from virtually anywhere.

  • The Multichannel Customer Care Report

    Sponsored by: Zendesk

    Today's customer wants the personalized experience of human communication but expects the speed and ease of automated services – thereby creating a paradoxical conundrum for businesses. Uncover the key findings of this 2017 customer care report to learn about multichannel strategies for meeting rising expectations.

  • IBM Connections Overview Demo: Experience Collaboration at Work

    Sponsored by: IBM

    Watch this brief video to learn about IBM Connections – a born-on-the-cloud collaboration platform – and discover how to optimize productivity, communication, and content management without sacrificing security or hiking up costs.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.