ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email White Papers

  • A How-To Guide for Effective Simulated Phishing Campaigns

    Sponsored by: MediaPRO

    As many companies know, innocent-looking email requests can lead to the release of sensitive information. This is why employers are adopting simulated email phishing campaigns to test the true knowledge of their employees. Read on for best practices to get the most out of your phishing campaigns.

  • Top 10 Ransomware from 2017

    Sponsored by: Versa Networks

    Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.

  • How Huisman Used Forcepoint Email and Web Security Cloud to Reduce Risk

    Sponsored by: Forcepoint

    Find out how Huisman, a globally operating company specializing in engineering and manufacturing, reduced risk with Forcepoint's cloud solution for email and web security.

  • Streamlining Operations with Centralized, Searchable Knowledge Bases

    Sponsored by: Wrike

    Centralized knowledge bases can be a lifesaver for IT teams and users alike. Find out how a large-scale furniture provider built an IT helpdesk and searchable knowledge base to support over 19 warehouse and showroom locations, even integrating G Suite tools for maximum efficiency.

  • Cyber Resilience for Email: Technical Deep Dive

    Sponsored by: Mimecast

    Email is the number one application that organizations depend on for communications. Unfortunately, it is also the number-one attack vector used by cybercriminals. Learn how your organization can stay protected against advanced email-borne threats, today.

  • Cyber Resilience for Email: Solution Brief

    Sponsored by: Mimecast

    Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.

  • Mimecast Advanced Security

    Sponsored by: Mimecast

    Learn how Mimecast's set of advanced cloud-based email security services can help protect your organization from advanced email-borne threats.

  • The State of Email Security: 2018 Report

    Sponsored by: Mimecast

    Email is at the intersection of a massive amount of risk. Attackers are using IT initiatives like migrating emails to cloud platforms are giving them the opportunity to exploit gaps in your security program. Download this report to learn more about how to fill the gaps in your email security.

  • Australian Organizations Know They Should Be More Cyber Resilient

    Sponsored by: Mimecast

    If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.

  • The Definitive Guide to Engaging Email Marketing

    Sponsored by: Marketo

    In this 156-page email marketing guide, uncover the 5 attributes of engaging email, which will help you tell richer and more compelling stories within your email marketing and beyond.

  • Roaming Outlook OST files on Physical Desktops

    Sponsored by: FSLogix

    Click to learn about Office 365 containers, and how this platform can offer an alternative to the performance dips caused by re-caching, and provide the same user experience that your on-premises e-mail system had.

  • No Kidnapping, No Ransom

    Sponsored by: Panda Security

    Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.

  • How to Identify the Right Tools, Technology and Talent to Get More Done

    Sponsored by: Evernote

    Many SMBs are keen to adopt technology tools in some areas of their business but they tend to stick to archaic collaboration processes. Automating manual collaborative processes does not need to be difficult. This resource details 6 steps for selecting automated collaboration technologies for your business.

  • Securing Office 365 with MobileIron

    Sponsored by: MobileIron

    As more and more employees use Office 365 on mobile devices instead of on traditional PCs, it's become increasingly important, and difficult, to secure and deploy the app on mobile devices. Download this white paper to learn about an app security platform that solves these challenges.

  • 2018 Beyond the Phish Report

    Sponsored by: Wombat Security Technologies

    In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.

  • Protecting People: A Quarterly Analysis of Highly Targeted Attacks

    Sponsored by: Proofpoint, Inc.

    Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.

  • The New Rules of Email Deliverability

    Sponsored by: SparkPost

    Take a closer look at this guide to get up to speed on the rapidly changing state of email deliverability, with 10 new rules including updates to old practices and emerging techniques.

  • Email Security that Matters at the Macro-Security Level

    Sponsored by: GreenPages Inc.

    Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.

  • 6 Customer Service Channels You Need to Support

    Sponsored by: Freshworks

    Inside this e-guide, you'll uncover the importance of economic supply and demand and an overview of the pros and cons of 6 customer service channels to improve customer experience.

  • The State of Transactional Email: 2018

    Sponsored by: SparkPost

    This infographic highlights why automated transactional emails are an integral part of your customer experience strategy and how to improve the effectiveness of yours.

  • The Product Manager’s Guide to Email

    Sponsored by: SparkPost

    Explore how email notifications and other app-generated email messages can help product teams building fast-growing services make the most of email in their products, and how product development teams can messages in their apps to nurture user engagement.

  • 10 Steps to Great Email Deliverability

    Sponsored by: SparkPost

    Tap into this resource for 10 best practices and key configuration steps to optimize your email deliverability and get your message out to the best audience.

  • Transactional Email Benchmark Report 2018

    Sponsored by: SparkPost

    Inside, uncover results from a survey conducted by SparkPost and view a snapshot of the state of transactional email in 2018, as well as 8 key findings and 5 core recommendations.

  • The Keys to Email Delivery for App Developers & Product Managers

    Sponsored by: SparkPost

    Find out why customer have increasingly come to expect smooth, cohesive experiences across devices and channels, and why email delivery is one of the top challenges for businesses trying to serve customers online.

  • From Chaotic Communications to a Unified Approach

    Sponsored by: RingCentral

    Learn about the impact of a unified communications platform on your organization's ability to collaborate effectively.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.