Research Library

Powered by

Email Research

  • Top Phishing Attacks: Discovery and Prevention

    Sponsored by: Agari

    Learn the behaviors of, and remedies for, phishing attacks that are targeting enterprises in ever increasing numbers.

  • How to Create Highly Effective Email Marketing

    Sponsored by: Marketo

    This ebook explains how you can craft 10 different types of marketing emails to create the most customer engagement possible. You'll learn the best time to send abandoned-cart emails, how much information to include in your new subscriber emails, what it takes to build lasting relationships with your customers, and more.

  • Your Guide to Business Email Compromise

    Sponsored by: Agari

    Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.

  • The Modern State of Email and How To Increase Your Deliverability

    Sponsored by: Marketo

    In this white paper, explore what drives modern email deliverability and learn some best practices for crafting an engaging email. Discover Gmail's new tabbed inbox filters, how to write subject lines with important "trigger words" and more.

  • Your Guide to Fraudulent Invoice Email

    Sponsored by: Agari

    In this webcast, learn how to combat targeted attacks, spear-phishing, and malicious emails dressed up to look and sound legitimate.

  • The Biggest Cyber Threat Facing Businesses Today

    Sponsored by: Agari

    Business email compromise (BEC) scams are by no means a new phenomenon. But as these scams become more sophisticated, it becomes even more important to stay up to date with the latest types of attacks to evolve out of BEC. Discover a proactive approach to risk management that will help protect your business against these advanced phishing attacks.

  • The Endpoint Security Guide to Preventing Ransomware Attacks

    Sponsored by: Carbon Black

    This e-book answers questions like "What is ransomware?" and "How does it work?" to help you learn how to defend your business. Explore how new and advanced ransomware like Locky operate and review case studies from companies that have successfully stopped attacks so that you can start preparing your organization.

  • Educast: Seamless Collaboration Leveraging WebRTC

    Sponsored by: Oracle Corporation

    You have most likely heard of WebRTC, but are you certain of what it is or how it works? In this webcast, discover the values and benefits of mating WebRTC with your UCC strategy to enable seamless collaboration.

  • Enhance Employee Productivity Cost Effectively with Unified Communications

    Sponsored by: Oracle Corporation

    This white paper explains how a converged unified communication (UCC) platform empowered by WebRTC can offer real-time voice and video communications with secure, reliable, and seamless interoperability across carrier and enterprise networks on a multitude of end points.

  • Security Framework: A Guide for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Customize Email Security in a Private Cloud

    Sponsored by: Intermedia

    Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.

  • Intermedia’s Exchange Email on a Dedicated AWS Cloud

    Sponsored by: Intermedia

    This informational white paper introduces an exchange system that leverages AWS cloud to provide a flexible, integrated and customizable service for your business. Access now and check out more of the obtainable benefits.

  • Top Email Marketing Blunders and How to Avoid (and Recover From) Them

    Sponsored by: Marketo

    This ebook reviews the potential blunders marketers make in their email marketing campaigns, why those blunders make a difference, and how to prevent (and fix) these types of mistakes.

  • The Definitive Guide to Engaging Email Marketing

    Sponsored by: Marketo

    Generic emails are a good way to alienate potential leads. Email marketing needs to be as engaging as possible in a market which bombards customers on a daily basis. Access this comphrensive guide to create the most engaging email marketing strategy possible.

  • Anatomy of an Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast

    Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.

  • Optimizing Web Application Security for the New Bad Bot Threat Landscape

    Sponsored by: Distil Networks

    Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.

  • Three Ways to Better Connect Your Workforce with Enterprise Social

    Sponsored by: Microsoft

    Download and discover how Enterprise Social allows your workers to connect to conversations, documents, and files that matter; be informed to make smarter decisions; and overall feel more engaged in their jobs and company culture.

  • Foster Collaborative Communication with SaaS

    Sponsored by: IBM

    If you're looking to lower your TCO, receive fast ROI and protect critical IP with the power of a collaborative software-as-a-service (SaaS) solution, download this quick just-the-facts video today. (Psst: it includes a hyperlink for a free trial of it, too!)

  • Case Study: Cloud Collaboration Streamlines Business Processes

    Sponsored by: IBM

    If you're looking for a platform with online collaboration tools and integrated web email to engage your teams and foster greater productivity, view this brief YouTube video and see how early adopters of SmartCloud solutions are reaping huge rewards for pennies on the dollar.

  • Top 5 Reasons Why Enterprises Are Going Google

    Sponsored by: Accenture

    This white paper discusses the top 5 reasons why enterprises are moving to the cloud by adopting Google Apps for collaboration and productivity. Learn how this cloud strategy can help you reduce the number of servers in use, embrace the mobile, BYOD culture, and more.

  • Why Microsoft Office 365 Native Archiving Isn’t Enough

    Sponsored by: Proofpoint, Inc.

    Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Information Security Magazine: Insider Edition

    Sponsored by:

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • Choose an Enterprise Cloud App Suite and Pull Off a Successful Migration

    Sponsored by: Accenture

    In this expert guide, Tom Nolle, data communications expert with 33 years of experience, explains why companies migrating to Microsoft Office 365 need to plan, pilot-test and verify at every step. Plus, Google Apps and Office 365 are evaluated (side-by-side) in terms of features, functionalities and cost.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.