ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email White Papers

  • Advanced Email Security

    Sponsored by: Proofpoint, Inc.

    Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.

  • Connect With Confidence: Three Steps to Stopping Advanced Email Threats

    Sponsored by: Proofpoint, Inc.

    Your brand may be at risk. Ransomware, business email compromise, and credential phishing may be bypassing your security defenses. Check out this resource to protect yourself from cyberattacks with steps to fight back.

  • How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing

    Sponsored by: Proofpoint, Inc.

    Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.

  • The Human Factor in Security

    Sponsored by: Proofpoint, Inc.

    Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.

  • Enterprise Case Study: Enabling a More Mobile Way of Working

    Sponsored by: Citrix

    Download this case study to see how one company was able to consolidate technologies to enable a more mobile way of working, and enhance employee productivity.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • CEO Fraud Prevention Manual

    Sponsored by: KnowBe4

    This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.

  • modusCloud Email Security URL Defense

    Sponsored by: Vircom

    Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.

  • Phishing is Big Business. Don't Get Hooked.

    Sponsored by: Sophos, Inc.

    91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • Confronting Today's Advanced Email Threats

    Sponsored by: Vircom

    Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.

  • Malware Year in Review 2016

    Sponsored by: PhishMe

    Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.

  • Navigating The Evolving Threat Landscape with Network Security

    Sponsored by: TrendMicro

    Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.

  • Enterprise Phishing Susceptibility and Resiliency Report

    Sponsored by: PhishMe

    Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.

  • Planning for Office 365 Gaps

    Sponsored by: Mimecast

    Learn how to put a plan into action to keep your system safe from the 3 risks that Office 365 poses.

  • What do 200 IT Decision Makers Think of Office 365?

    Sponsored by: Mimecast

    In the fall of 2016, 200 IT decision makers from around the globe were interviewed by VansonBourne Research about their experience using Office 365 Exchange Online in 4 areas. Download now to view their evaluation, and react accordingly when implementing it in your organization.

  • Closing The Cloud Email Security Gap

    Sponsored by: Mimecast

    This Forrester Research Report surveys 220 IT pros tests the hypothesis that organizations are unaware of how at risk their cloud email systems are, and need to take extra steps to make sure their data remains secure.

  • Choosing a Unified Mobile and Cloud Security Platform

    Sponsored by: MobileIron

    Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.

  • 10 Things You Need to Know About Ransomware

    Sponsored by: Cylance

    As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.

  • Getting Started With Dmarc: Your Email Security

    Sponsored by: Proofpoint, Inc.

    Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.

  • The Multichannel Customer Care Report

    Sponsored by: Zendesk

    Today's customer wants the personalized experience of human communication but expects the speed and ease of automated services – thereby creating a paradoxical conundrum for businesses. Uncover the key findings of this 2017 customer care report to learn about multichannel strategies for meeting rising expectations.

  • Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense

    Sponsored by: Proofpoint, Inc.

    Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.

  • The myth of email as proof of communication

    Sponsored by: ComputerWeekly.com

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

  • How to Build an Enterprise Cybersecurity Plan

    Sponsored by: Fortinet, Inc.

    A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.