ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email White Papers

  • Get the most out of Office 365

    Sponsored by: Citrix

    Download this resource to see how virtualization can help you overcome Office 365 migration challenges and achieve faster migration, easier maintenance, and increased security.

  • Visual Collaboration: How to Attract Clients and Win the Day for Your Consulting Firm

    Sponsored by: Bluescape

    Discover how to create new business with visual collaboration tools. Especially when managing increasingly mobile teams, find out what you can do to enhance collaboration pre- and post- sales, nurture long-term relationships with clients, improve upon collaboration techniques like email, and more.

  • 3 Ways Visual Collaboration Helps Filmmakers Create Better

    Sponsored by: Bluescape

    Explore how to revitalize collaboration with tools designed to promote productivity and better communication. Discover how creative professionals like filmmakers can use visual collaboration to improve upon technologies like email.

  • Advanced Email Security

    Sponsored by: Proofpoint, Inc.

    Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.

  • How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing

    Sponsored by: Proofpoint, Inc.

    Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.

  • The Human Factor in Security

    Sponsored by: Proofpoint, Inc.

    Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • Malware Year in Review 2016

    Sponsored by: PhishMe

    Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.

  • Enterprise Phishing Susceptibility and Resiliency Report

    Sponsored by: PhishMe

    Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.

  • How to Build an Enterprise Cybersecurity Plan

    Sponsored by: Fortinet, Inc.

    A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.

  • Choosing a Unified Mobile and Cloud Security Platform

    Sponsored by: MobileIron

    Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.

  • 10 Things You Need to Know About Ransomware

    Sponsored by: Cylance

    As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.

  • Getting Started With Dmarc: Your Email Security

    Sponsored by: Proofpoint, Inc.

    Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.

  • Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense

    Sponsored by: Proofpoint, Inc.

    Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.

  • The myth of email as proof of communication

    Sponsored by: ComputerWeekly.com

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

  • PwC: A Security Framework for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • Why Microsoft Office 365 Native Archiving Isn’t Enough

    Sponsored by: Proofpoint, Inc.

    Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.

  • Email and Threat Intelligence: From Inbox to Action

    Sponsored by: ThreatConnect

    Discover how you can accurately collect and examine threat intelligence to prevent phishing schemes from infecting your network. Gain knowledge and insight into malicious actors so you can prevent future, possibly business-crippling, attacks.

  • Navigating The Evolving Threat Landscape with Network Security

    Sponsored by: TrendMicro

    Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Information Security Magazine: Insider Edition

    Sponsored by: SearchSecurity.com

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • Choose an Enterprise Cloud App Suite and Pull Off a Successful Migration

    Sponsored by: Accenture

    In this expert guide, Tom Nolle, data communications expert with 33 years of experience, explains why companies migrating to Microsoft Office 365 need to plan, pilot-test and verify at every step. Plus, Google Apps and Office 365 are evaluated (side-by-side) in terms of features, functionalities and cost.

  • Is Your Sales Email Strategy Wasting or Maximizing Time?

    Sponsored by: Microsoft

    This infographic reveals the best times for salespeople to send emails to potential customers. View now to see if your sales email strategy is wasting or maximizing time.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.