ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email White Papers

  • Email-borne Malware Highlights Danger of Over-reliance on Sandboxes

    Sponsored by: Mimecast North America

    Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast North America

    Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.

  • Ransomware is Increasing the Risks and Impact to Organizations

    Sponsored by: Mimecast North America

    Discover the increasing risk and impact of ransomware on the enterprise and what can be done to mitigate its effect. Learn about ransomware attack vectors, the real price of an attack, how to prevent ransomware, and more.

  • Email Security in a Zero Trust World

    Sponsored by: Mimecast North America

    Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.

  • A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks

    Sponsored by: Mimecast North America

    Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.

  • Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast North America

    Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.

  • Five Tactics to Stop Email Attacks

    Sponsored by: Mimecast North America

    Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.

  • Tackle Email Fraud with Comprehensive Targeted Threat Protection

    Sponsored by: Mimecast North America

    This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.

  • 5 Essentials for Cloud Archiving Success

    Sponsored by: Mimecast North America

    Discover 5 essentials for email cloud archiving to keep your enterprise's data safe, available for easy access and sharing across the organization.

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.

  • The myth of email as proof of communication

    Sponsored by: ComputerWeekly.com

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

  • Case Study: How H-E-B Took the Reins of its Email Security

    Sponsored by: Proofpoint, Inc.

    In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.

  • Personify your Security Team and Gain Access a Recent Email Security Report

    Sponsored by: Mimecast

    This e-book reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast

    To solve mailbox bloat, CIOs are turning to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.

  • Enhance Employee Productivity Cost Effectively with Unified Communications

    Sponsored by: Oracle Corporation

    This white paper explains how a converged unified communication (UCC) platform empowered by WebRTC can offer real-time voice and video communications with secure, reliable, and seamless interoperability across carrier and enterprise networks on a multitude of end points.

  • Why Microsoft Office 365 Native Archiving Isn’t Enough

    Sponsored by: Proofpoint, Inc.

    Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.

  • Anatomy of an Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast

    Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.

  • Optimizing Web Application Security for the New Bad Bot Threat Landscape

    Sponsored by: Distil Networks

    Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.

  • Information Security Magazine: Insider Edition

    Sponsored by: SearchSecurity.com

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • Top 5 Reasons Why Enterprises Are Going Google

    Sponsored by: Accenture

    This white paper discusses the top 5 reasons why enterprises are moving to the cloud by adopting Google Apps for collaboration and productivity. Learn how this cloud strategy can help you reduce the number of servers in use, embrace the mobile, BYOD culture, and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Mimecast

    This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis. Access now to learn how to overcome complexity in Exchange environments, incident response, and more.

  • 7 Lessons Learned from an Office 365 Migration

    Sponsored by: Mimecast

    In this exclusive e-guide, find out what one expert learned during his company's migration to Office 365. Discover how to avoid mistakes with these 7 lessons.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Choose an Enterprise Cloud App Suite and Pull Off a Successful Migration

    Sponsored by: Accenture

    In this expert guide, Tom Nolle, data communications expert with 33 years of experience, explains why companies migrating to Microsoft Office 365 need to plan, pilot-test and verify at every step. Plus, Google Apps and Office 365 are evaluated (side-by-side) in terms of features, functionalities and cost.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.