ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Research

  • Keeping Email Vulnerability at Bay

    Sponsored by: ArcMail Technology

    Access this CIO Review article to learn how email archiving is becoming a common way to fight data theft in enterprises today. Explore email archiving market trends and needs, how to ensure cost effective, continuous security, and more.

  • The Impact of the New FRCP Amendments on Your Business

    Sponsored by: ArcMail Technology

    In this white paper, revisit the changes to the Federal Rules of Civil Procedure and what the implications are for your organization's email storage and compliance policies.

  • Three Rules for Managing Email Compliance

    Sponsored by: ArcMail Technology

    Discover 3 email security and ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.

  • Email Archiving vs. Destructive Retention Policies

    Sponsored by: ArcMail Technology

    In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.

  • Protecting Business Critical Services – Email

    Sponsored by: LogicNow

    This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.

  • Email Continuity: Protecting your Business Against Email Downtime

    Sponsored by: LogicNow

    With today's organizations relying on email as a critical communication tool, they can ill-afford any downtime. This white paper discusses how to overcome email outages with an externally hosted email continuity service, which allows organizations to avoid lost productivity, lost business, and other consequences that arise from email outages.

  • Spearphishing Survival Guide: How to Stop Advanced Email Attacks

    Sponsored by: Proofpoint, Inc.

    This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.

  • Top 5 Reasons Why Enterprises Are Going Google

    Sponsored by: Accenture

    This white paper discusses the top 5 reasons why enterprises are moving to the cloud by adopting Google Apps for collaboration and productivity. Learn how this cloud strategy can help you reduce the number of servers in use, embrace the mobile, BYOD culture, and more.

  • A Guide to Email Security for Mid-sized Businesses

    Sponsored by: LogicNow

    In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.

  • How to Defend Office 365 From Cybercrime

    Sponsored by: LogicNow

    This white paper outlines how you can defend Office 365 from cybercrime and protect corporate data using cloud-based email security. Learn how this security strategy helps to protect users from phishing, malware infections, and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Mimecast

    This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis. Access now to learn how to overcome complexity in Exchange environments, incident response, and more.

  • 7 Lessons Learned from an Office 365 Migration

    Sponsored by: Mimecast

    In this exclusive e-guide, find out what one expert learned during his company's migration to Office 365. Discover how to avoid mistakes with these 7 lessons.

  • The Top Five Office 365 Features

    Sponsored by: Mimecast

    In this exclusive e-guide, our Exchange experts round up the top Office 365 features. Discover how to strengthen your critical communication apps in 5 different ways.

  • Email and Threat Intelligence: From Inbox to Action

    Sponsored by: ThreatConnect

    This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.

  • Best Practices for Securing your Cloud Email Service

    Sponsored by: Mimecast

    This eGuide explains how to weigh the two so your migration succeeds, and what criteria to look for in the security tools every email service needs.

  • Malicious Email Files: The Growing Digital Weapon

    Sponsored by: Check Point Software Technologies Ltd.

    This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.

  • Make Your Cloud Email Migration a Smooth Transition

    Sponsored by: Mimecast

    Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.

  • Best Practices for Evaluating Your Cloud Messaging Options

    Sponsored by: Mimecast

    In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.

  • A Guide to Email Retention and UK Compliance Laws

    Sponsored by: Barracuda Networks Inc.

    This white paper provides a guide to email retention and compliance laws in the UK. Read on to learn how you should be archiving data so that you can avoid legal complications in the future.

  • Solution Review: Migrating PST Files to Exchange and Office 365

    Sponsored by: Barracuda Networks Inc.

    This review offers an inside look at a data management solution that takes a professional approach to migrating PST files into Exchange and Office 365. Read on to discover how this strategy can work for both your distributed and centralized PST migration.

  • The Seven Perils of PSTs

    Sponsored by: Barracuda Networks Inc.

    This resource details the 7 dangers of PSTs, and how to overcome them by archiving. Read on to learn how PSTs can impact eDiscovery, data risk, and more.

  • Is Email Sapping your Organization's Productivity? How to Stop the Productivity Drain

    Sponsored by: ServiceNow

    In this webinar, Dave Wright, Chief Strategy Officer at ServiceNow, and Ron Markham, Strategy Leader at ServiceNow, address the drain in enterprise-level productivity, and the role of email in this drain. Access this video now to examine a cloud-based service that will streamline otherwise complex work processes.

  • Choose an Enterprise Cloud App Suite and Pull Off a Successful Migration

    Sponsored by: Accenture

    In this expert guide, Tom Nolle, data communications expert with 33 years of experience, explains why companies migrating to Microsoft Office 365 need to plan, pilot-test and verify at every step. Plus, Google Apps and Office 365 are evaluated (side-by-side) in terms of features, functionalities and cost.

  • Is Your Sales Email Strategy Wasting or Maximizing Time?

    Sponsored by: Microsoft

    This infographic reveals the best times for salespeople to send emails to potential customers. View now to see if your sales email strategy is wasting or maximizing time.

  • Modern Infrastructure E-Zine – October 2015

    Sponsored by: SearchDataCenter.com

    The October 2015 issue of our Modern Infrastructure e-zine is here, and it brings to the table a variety of interesting topics. Discover insights on thinking out, not up; explore data-aware storage; delve into the shortcomings of email, and more.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.