ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Research

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.

  • The myth of email as proof of communication

    Sponsored by: ComputerWeekly.com

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

  • Case Study: How H-E-B Took the Reins of its Email Security

    Sponsored by: Proofpoint, Inc.

    In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast

    To solve mailbox bloat, CIOs are turning to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.

  • PwC: A Security Framework for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • Why Microsoft Office 365 Native Archiving Isn’t Enough

    Sponsored by: Proofpoint, Inc.

    Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.

  • Anatomy of an Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast

    Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.

  • Top 5 Reasons Why Enterprises Are Going Google

    Sponsored by: Accenture

    This white paper discusses the top 5 reasons why enterprises are moving to the cloud by adopting Google Apps for collaboration and productivity. Learn how this cloud strategy can help you reduce the number of servers in use, embrace the mobile, BYOD culture, and more.

  • 7 Lessons Learned from an Office 365 Migration

    Sponsored by: Mimecast

    In this exclusive e-guide, find out what one expert learned during his company's migration to Office 365. Discover how to avoid mistakes with these 7 lessons.

  • Email and Threat Intelligence: From Inbox to Action

    Sponsored by: ThreatConnect

    Discover how you can accurately collect and examine threat intelligence to prevent phishing schemes from infecting your network. Gain knowledge and insight into malicious actors so you can prevent future, possibly business-crippling, attacks.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Information Security Magazine: Insider Edition

    Sponsored by: SearchSecurity.com

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • Choose an Enterprise Cloud App Suite and Pull Off a Successful Migration

    Sponsored by: Accenture

    In this expert guide, Tom Nolle, data communications expert with 33 years of experience, explains why companies migrating to Microsoft Office 365 need to plan, pilot-test and verify at every step. Plus, Google Apps and Office 365 are evaluated (side-by-side) in terms of features, functionalities and cost.

  • Is Your Sales Email Strategy Wasting or Maximizing Time?

    Sponsored by: Microsoft

    This infographic reveals the best times for salespeople to send emails to potential customers. View now to see if your sales email strategy is wasting or maximizing time.

  • Modern Infrastructure E-Zine – October 2015

    Sponsored by: SearchDataCenter.com

    The October 2015 issue of our Modern Infrastructure e-zine is here, and it brings to the table a variety of interesting topics. Discover insights on thinking out, not up; explore data-aware storage; delve into the shortcomings of email, and more.

  • University Improves Learning with Cloud Messaging

    Sponsored by: Dimension Data

    In this case study, explore how a university with a large, diverse student and staff population updated their ageing, legacy email system with a cloud messaging solution.

  • Top 5 Reasons You Should Dump Your In-House Email Infrastructure

    Sponsored by: Message Bus

    Access this expert e-guide to find 5 reasons why you should dump your in-house email infrastructure.

  • Improving the Success of Your Enterprise's Email Marketing Campaigns

    Sponsored by: Teradata

    This document outlines some of the standard best practices that can enhance email communications, including: segmentation, personalization, mobile optimization, and landing pages. It also includes mistakes to avoid to increase customer loyalty and nurture incoming leads.

  • 5 Reasons Why Email Archiving is the New Killer App

    Sponsored by: Commvault

    Businesses use many applications every day, but one is used most frequently – email. This expert white paper details the top 5 reasons why email archiving is the most important application.

  • Email Archiving: A Buyer's Checklist

    Sponsored by: Commvault

    Email is not only the primary source of business communication, it also stores valuable data. This white paper details a helpful email archiving buyer's guide checklist.

  • 7 Reasons to Worry About Your Current Email Archiving Strategy

    Sponsored by: Commvault

    This resource lists the top seven reasons you may need to worry that your email archiving strategy won't meet your long-term goals.

  • Secure Mobile Email for the Lean IT Department

    Sponsored by: Shavlik Technologies

    This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.

  • Everything You Need to Know about Enterprise Mobility Management

    Sponsored by: CA Technologies.

    Enterprise mobility management (EMM) strategies encompass several challenging problems for IT. From meeting the ever-increasing demands of end-users and the mobile devices they own, to security and threat risks, there is a lot to know about EMM.

  • Improve Enterprise Email Systems with HP Messaging Services

    Sponsored by: Hewlett-Packard Enterprise

    Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.