Research Library

Powered by

Email Research

  • 3 Ways Visual Collaboration Helps Filmmakers Create Better

    Sponsored by: Bluescape

    Explore how to revitalize collaboration with tools designed to promote productivity and better communication. Discover how creative professionals like filmmakers can use visual collaboration to improve upon technologies like email.

  • Sweden: Internet Security Threat Profile in Numbers

    Sponsored by: Symantec & Blue Coat Systems

    Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?

  • How to: Attract Clients, Boost Revenues, and Win the Day for Your Consulting Firm

    Sponsored by: Bluescape

    Discover how your consulting firm can coordinate collaboration and productivity across your teams – no matter where employees are – with collaborative software that updates and improves upon the capabilities of technologies like email, file sharing, and web conferencing.

  • United Kingdom: Internet Security Threat Profile in Numbers

    Sponsored by: Symantec & Blue Coat Systems

    Take a closer look at this brief resource to reveal cyber threat statistics based on company size and industry in the UK.

  • Saudi Arabia: Internet Security Threat Profile in Numbers

    Sponsored by: Symantec & Blue Coat Systems

    Which industries receive the most email attacks, including malware, phishing and spam?

  • Unknown Threat Detection Platform

    Sponsored by: OPSWAT inc

    Protecting potentially harmful code is essential when securing your data. Watch this webcast to uncover how to block unknown threats and detect outbreaks.

  • Office 365 Risk Mitigation

    Sponsored by: Mimecast

    Read this white paper to discover suggestions to enhance the security of your Office 365. With the suggestions provided, determine which security tactics will improve your security posture.

  • Ransomware is Increasing: The Risks & Impact to Organizations

    Sponsored by: Mimecast

    Organizations need strong email security services that are able to identify ransomware and prevent it from infecting business computers. Read this report to discover tactics organizations can use to educate their employees on ransomware protection.

  • Report: The Quarterly Threat

    Sponsored by: Proofpoint, Inc.

    Check out this report compiled by Proofpoint, Inc. to uncover sophisticated threats across email, the web, social media, and mobile.

  • Advanced Email Security

    Sponsored by: Proofpoint, Inc.

    Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.

  • Connect With Confidence: Three Steps to Stopping Advanced Email Threats

    Sponsored by: Proofpoint, Inc.

    Your brand may be at risk. Ransomware, business email compromise, and credential phishing may be bypassing your security defenses. Check out this infographic to protect your organization from cyberattacks with 3 steps to fight back.

  • How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing

    Sponsored by: Proofpoint, Inc.

    Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.

  • The Human Factor in Security

    Sponsored by: Proofpoint, Inc.

    Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.

  • The New Rules For Skills-Based Routing to Improve Your Customer Experience

    Sponsored by: Mitel Networks Limited

    Skills-based routing has been around for a long time, but now it has evolved to the point where it has become a key differentiator for contact centers looking to enhance their customer experiences. Learn how to redefine skills-based routing to filter interactions with customers via calls, email, web chat, and SMS.

  • Enterprise Case Study: Enabling a More Mobile Way of Working

    Sponsored by: Citrix

    Download this case study to see how one company was able to consolidate technologies to enable a more mobile way of working, and enhance employee productivity.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • CEO Fraud Prevention Manual

    Sponsored by: KnowBe4

    This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.

  • modusCloud Email Security URL Defense

    Sponsored by: Vircom

    Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.

  • Phishing is Big Business. Don't Get Hooked.

    Sponsored by: Sophos, Inc.

    91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.

  • Confronting Today's Advanced Email Threats

    Sponsored by: Vircom

    Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.

  • Malware Year in Review 2016

    Sponsored by: PhishMe

    Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.

  • Internet and Security Threat Report 2017

    Sponsored by: Symantec

    Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.

  • Enterprise Phishing Susceptibility and Resiliency Report

    Sponsored by: PhishMe

    Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.

  • Planning for Office 365 Gaps

    Sponsored by: Mimecast

    Learn how to put a plan into action to keep your system safe from the 3 risks that Office 365 poses.

  • Navigating The Evolving Threat Landscape with Network Security

    Sponsored by: TrendMicro

    Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.