ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Research

  • Cognito Detect for Office 365

    Sponsored by: Vectra Networks

    Office 365 data breaches are at the forefront. In fact, 30% of organizations suffer from Office 365 account takeovers every month. In this data sheet, learn how the Vectra Cognito platform to Microsoft Office 365 can help your organization prevent data breaches in the cloud.

  • Inbound and Outbound Email Protection

    Sponsored by: Armorblox

    Email attacks today are laser targeted and evade traditional detection by preying on human nature. That’s why organizations today need an email security platform that protects against targeted attacks such as BEC, account takeover, and executive impersonations. View this data sheet to learn about Armorblox’s platform features and benefits.

  • Email security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • How Phishing Security Software is Different from Email Security Software

    Sponsored by: Inky Technology

    All legacy email security apps on the market have value and are useful within the space that they operate. However, there are many differences between traditional email security software and anti-phishing software platforms. Read on to learn more.

  • 5 Examples of Phishing Emails That Killed Companies

    Sponsored by: Inky Technology

    In this article, uncover the 5 most costly phishing attacks of the last few years.

  • 2019 End of Year Email Phishing Report

    Sponsored by: Inky Technology

    Traditional email security products block plenty of phishing emails. But new research shows that hundreds, if not thousands, of potentially dangerous emails per company get through every year. Download INKY’s 2019 End of the Year Report for insights on evolving phishing attacks and new countermeasures.

  • Email Security Risk Assessment for Microsoft Office 365

    Sponsored by: Mimecast

    View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.

  • Understanding Phishing: Fake Attachments

    Sponsored by: Inky Technology

    Malicious fake attachments are a trend that has security pros on the alert.So how can you spot them at first glance and before they do serious damage? This special phishing report for security pros reveals exactly how it’s done.

  • Dutch DIY Giant Shelves Email Attacks

    Sponsored by: Barracuda

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Whitepaper: Does Office 365 Deliver the Email Security and Resilience Enterprises Need?

    Sponsored by: Mimecast

    In this white paper, learn about the native security features Office 365 delivers, as well as how to extend them for the added resilience you need to keep your communications safe.

  • Proofpoint Information Protection Research Team

    Sponsored by: Proofpoint

    Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.

  • Who will win the world's biggest cloud contract?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • Special Report: 2019 Email Security Trends

    Sponsored by: Barracuda

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • Conversational Geek Office 365 Risk Mitigation

    Sponsored by: Mimecast

    If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.

  • Email security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Top 10 Reasons Customers Choose Proofpoint to Protect Office 365

    Sponsored by: Proofpoint

    For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Download this infographic for the top 10 reasons why customers choose Proofpoint to protect Office 365.

  • Why Mimecast Web Security?

    Sponsored by: Mimecast

    In this infographic, find out how Mimecast Web Security can help your organization defend against advanced phishing and malware attacks that come via email, web, instant messaging systems, social network sites, and ad networks.

  • Email Security Risk Assessment

    Sponsored by: Mimecast

    Many organizations think their current email security systems are up to the task of protecting them from phishing. Unfortunately, many of them fall short and don't keep their organizations safe. In this report, uncover research from Mimecast's study on the amount of unwanted and dangerous emails missed by incumbent email security systems.

  • Common Office 365 Email Security Issue: Phishing

    Sponsored by: Inky Technology

    Discover the common Office 365 email security attacks that have been infiltrating businesses emails.

  • Internal Threats Personified: How Employees Can Jeopardize Your Cybersecurity

    Sponsored by: Mimecast

    Your employees can be your greatest asset, or your weakest link when it comes to email security. In this e-book, find several email-related activities that employees often engage in that contribute to the spread of these insider (hidden) threats and discover what your organization can do to protect itself.

  • How Spear Phishing Targets the C-Suite

    Sponsored by: Inky Technology

    In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.

  • Proofpoint Security and Compliance for Microsoft Office 365

    Sponsored by: Proofpoint

    Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.