ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email White Papers

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security. Discover what lessons its limitations will teach you, such as: siloed security is not sustainable, fragmented data loss prevention decreases your chance of success, archiving must be defensible and e-discovery ready, and more.

  • The myth of email as proof of communication

    Sponsored by: ComputerWeekly.com

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

  • Case Study: How H-E-B Took the Reins of its Email Security

    Sponsored by: Proofpoint, Inc.

    In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it: eliminated false positive message classification, reduced IT help tickets, improved general email security, and assumed granular control over spam and bulk mail classification within Office 365.

  • Sync, Send and Receive: Why Cloud-Based Email and Storage Make Business Sense

    Sponsored by: Microsoft

    Your business may not be enormous, but the amount of information you generate—even in one day—can be. Read on to discover how SMBs that adopt cloud-based email and storage will reduce their operational costs, increase productive collaboration with strategic use of IT staff, and more.

  • The PM Challenges of Email, Excel Spreadsheets and Desktop Folders

    Sponsored by: Cerri.com AG

    Email inboxes, spreadsheets, and desktop folders are considered old school tools when it comes to project management. Sure, they still work in some cases, but you'll never be able to grow your company beyond these tools' capabilities. This white paper examines the pros and cons of the old tools and compares them to project management software.

  • Email Security Best Practices to Help Avoid Downtime

    Sponsored by: Rackspace

    This white paper aims to provide a deeper understanding of the factors that can impact your current email solution's security risks and unplanned downtime, as well how to help you better compare and evaluate your current email solution with that of a newer version.

  • Personify your Security Team and Gain Access a Recent Email Security Report

    Sponsored by: Mimecast

    This infographic reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast

    To solve mailbox bloat, CIOs are turing to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.

  • Combat the Most Common Forms of Phishing Attacks

    Sponsored by: Agari

    Learn the behaviors of, and remedies for, 6 of the top phishing attacks that are targeting enterprises in ever increasing numbers.

  • How to Create Highly Effective Email Marketing

    Sponsored by: Marketo

    This ebook explains how you can craft 10 different types of marketing emails to create the most customer engagement possible. You'll learn the best time to send abandoned-cart emails, how much information to include in your new subscriber emails, what it takes to build lasting relationships with your customers, and more.

  • The Modern State of Email and How To Increase Your Deliverability

    Sponsored by: Marketo

    In this white paper, explore what drives modern email deliverability and learn some best practices for crafting an engaging email. Discover Gmail's new tabbed inbox filters, how to write subject lines with important "trigger words" and more.

  • The Importance of Proactive Risk Management in Email Security

    Sponsored by: Agari

    Business email compromise (BEC) scams are becoming more sophisticated. Access this executive brief to keep ahead of the curve and learn how to mitigate the risks of the newest breed of BEC attacks while gaining deep insight into your email ecosystem.

  • Security Framework: A Guide for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Why Microsoft Office 365 Native Archiving Isn’t Enough

    Sponsored by: Proofpoint, Inc.

    Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.

  • Top Email Marketing Blunders and How to Avoid (and Recover From) Them

    Sponsored by: Marketo

    This ebook reviews the potential blunders marketers make in their email marketing campaigns, why those blunders make a difference, and how to prevent (and fix) these types of mistakes.

  • The Definitive Guide to Engaging Email Marketing

    Sponsored by: Marketo

    Generic emails are a good way to alienate potential leads. Email marketing needs to be as engaging as possible in a market which bombards customers on a daily basis. Access this comphrensive guide to create the most engaging email marketing strategy possible.

  • Anatomy of an Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast

    Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.

  • Optimizing Web Application Security for the New Bad Bot Threat Landscape

    Sponsored by: Distil Networks

    Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.

  • Why Today's Phishing Attacks are Harder to Detect

    Sponsored by: Proofpoint, Inc.

    Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.

  • Enable secure mobile collaboration for your business

    Sponsored by: IBM MaaS360

    Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Information Security Magazine: Insider Edition

    Sponsored by: SearchSecurity.com

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.