ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Research

  • Think Again if you believe your email archiving problems are solved with Office 365

    Sponsored by: LogicNow

    Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.

  • Email Security Strategies for Mid-Sized Enterprises

    Sponsored by: LogicNow

    Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.

  • Bullet-proofing Office 365 Email

    Sponsored by: LogicNow

    Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.

  • Top Email Marketing Blunders and How to Avoid (and Recover From) Them

    Sponsored by: Marketo

    This ebook reviews the potential blunders marketers make in their email marketing campaigns, why those blunders make a difference, and how to prevent (and fix) these types of mistakes.

  • The Definitive Guide to Engaging Email Marketing

    Sponsored by: Marketo

    Generic emails are a good way to alienate potential leads. Email marketing needs to be as engaging as possible in a market which bombards customers on a daily basis. Access this comphrensive guide to create the most engaging email marketing strategy possible.

  • Evaluation Report: Microsoft Exchange for the Small-to-Medium Business on HPE MSA 2040 Storage

    Sponsored by: Hewlett Packard Enterprise

    This white paper examines a storage system designed to ensure the highest performance and resilience for Exchange in SMBs. Read on to learn why research group, Demartek, recommends that business seeking to deploy email storage in a cost effective manner give this option serious consideration.

  • Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • Anatomy of an Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast

    Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.

  • The Many Benefits of Email Security Gateways

    Sponsored by: ZixCorp

    This e-guide examines the benefits of email security gateways. Beyond just preventing malicious email, gateways have a plethora of other benefits including DLP and BYOD security.

  • Optimizing Web Application Security for the New Bad Bot Threat Landscape

    Sponsored by: Distil Networks

    Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.

  • Why Today's Phishing Attacks are Harder to Detect

    Sponsored by: Proofpoint, Inc.

    Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.

  • Mobilize Your Corporate Content and Apps

    Sponsored by: IBM MaaS360

    Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • Prevent Email Breaches with Zix

    Sponsored by: ZixCorp

    This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.

  • The Risks of Email and the Rewards of Innovative Encryption

    Sponsored by: ZixCorp

    This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.

  • Navigating Email Security

    Sponsored by: ZixCorp

    Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.

  • Building the Business Case for Email Archiving

    Sponsored by: ArcMail Technology

    Access this expert e-guide to find out how to reduce risk associated with unchecked data, lower your total cost of ownership while improving performance and simplicity of operations, as well as consolidate control. Also explore the facets to look for in an email archiving tool.

  • Top 5 Considerations in Choosing a Third-Party Solution for Email Archiving

    Sponsored by: ArcMail Technology

    Discover 5 key considerations for choosing an email archiving tool, including ease of use/ease of deployment, compliance and e-discovery, storage management and server performance, and 2 more.

  • Keeping Email Vulnerability at Bay

    Sponsored by: ArcMail Technology

    Access this CIO Review article to learn how email archiving is becoming a common way to fight data theft in enterprises today. Explore email archiving market trends and needs, how to ensure cost effective, continuous security, and more.

  • The Impact of the New FRCP Amendments on Your Business

    Sponsored by: ArcMail Technology

    In this white paper, revisit the changes to the Federal Rules of Civil Procedure and what the implications are for your organization's email storage and compliance policies.

  • Three Rules for Managing Email Compliance

    Sponsored by: ArcMail Technology

    Discover 3 email security and ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.

  • Email Archiving vs. Destructive Retention Policies

    Sponsored by: ArcMail Technology

    In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Information Security magazine: Insider Edition

    Sponsored by: SearchSecurity.com

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing perimeter and bring on board the best new security tools to protect your enterprise.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.