Research Library

Powered by

Email White Papers

  • Top 10 Ransomware from 2017

    Sponsored by: Versa Networks

    Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.

  • Streamlining Operations with Centralized, Searchable Knowledge Bases

    Sponsored by: Wrike

    Centralized knowledge bases can be a lifesaver for IT teams and users alike. Find out how a large-scale furniture provider built an IT helpdesk and searchable knowledge base to support over 19 warehouse and showroom locations, even integrating G Suite tools for maximum efficiency.

  • Australian Organizations Know They Should Be More Cyber Resilient

    Sponsored by: Mimecast

    If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.

  • No Kidnapping, No Ransom

    Sponsored by: Panda Security

    Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.

  • Securing Office 365 with MobileIron

    Sponsored by: MobileIron

    As more and more employees use Office 365 on mobile devices instead of on traditional PCs, it's become increasingly important, and difficult, to secure and deploy the app on mobile devices. Download this white paper to learn about an app security platform that solves these challenges.

  • Maximize Your Investment in Microsoft Office 365 with Citrix Workspace

    Sponsored by: Citrix

    Download this resource to find out how a unified workspace management platform can help you simplify the move to Office 365 with an integrated approach to cloud, mobility, and application delivery requirements, to ensure a seamless transition.

  • Threat Intelligence Report

    Sponsored by: F5 Networks

    How do you safeguard your employees from becoming phishing bait? In this report, learn why phishing campaigns work so well, how unsuspecting users play into the hands of attackers, and what your organization can do to avoid them.

  • A How-To Guide for Effective Simulated Phishing Campaigns

    Sponsored by: MediaPRO

    As many companies know, innocent-looking email requests can lead to the release of sensitive information. This is why employers are adopting simulated email phishing campaigns to test the true knowledge of their employees. Read on for best practices to get the most out of your phishing campaigns.

  • Protecting People: A Quarterly Analysis of Highly Targeted Attacks

    Sponsored by: Proofpoint, Inc.

    Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.

  • How Huisman Used Forcepoint Email and Web Security Cloud to Reduce Risk

    Sponsored by: Forcepoint

    Find out how Huisman, a globally operating company specializing in engineering and manufacturing, reduced risk with Forcepoint's cloud solution for email and web security.

  • Cyber Resilience for Email: Technical Deep Dive

    Sponsored by: Mimecast

    Email is the number one application that organizations depend on for communications. Unfortunately, it is also the number-one attack vector used by cybercriminals. Learn how your organization can stay protected against advanced email-borne threats, today.

  • Cyber Resilience for Email: Solution Brief

    Sponsored by: Mimecast

    Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.

  • Mimecast Advanced Security

    Sponsored by: Mimecast

    Learn how Mimecast's set of advanced cloud-based email security services can help protect your organization from advanced email-borne threats.

  • The State of Email Security: 2018 Report

    Sponsored by: Mimecast

    Email is at the intersection of a massive amount of risk. Attackers are using IT initiatives like migrating emails to cloud platforms are giving them the opportunity to exploit gaps in your security program. Download this report to learn more about how to fill the gaps in your email security.

  • The Definitive Guide to Engaging Email Marketing

    Sponsored by: Marketo

    In this 156-page email marketing guide, uncover the 5 attributes of engaging email, which will help you tell richer and more compelling stories within your email marketing and beyond.

  • Roaming Outlook OST files on Physical Desktops

    Sponsored by: FSLogix

    Click to learn about Office 365 containers, and how this platform can offer an alternative to the performance dips caused by re-caching, and provide the same user experience that your on-premises e-mail system had.

  • The New Rules of Email Deliverability

    Sponsored by: SparkPost

    Take a closer look at this guide to get up to speed on the rapidly changing state of email deliverability, with 10 new rules including updates to old practices and emerging techniques.

  • Email Security that Matters at the Macro-Security Level

    Sponsored by: GreenPages Inc.

    Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.

  • How to Identify the Right Tools, Technology and Talent to Get More Done

    Sponsored by: Evernote

    Many SMBs are keen to adopt technology tools in some areas of their business but they tend to stick to archaic collaboration processes. Automating manual collaborative processes does not need to be difficult. This resource details 6 steps for selecting automated collaboration technologies for your business.

  • 6 Customer Service Channels You Need to Support

    Sponsored by: Freshworks

    Inside this e-guide, you'll uncover the importance of economic supply and demand and an overview of the pros and cons of 6 customer service channels to improve customer experience.

  • The State of Transactional Email: 2018

    Sponsored by: SparkPost

    This infographic highlights why automated transactional emails are an integral part of your customer experience strategy and how to improve the effectiveness of yours.

  • The Product Manager’s Guide to Email

    Sponsored by: SparkPost

    Explore how email notifications and other app-generated email messages can help product teams building fast-growing services make the most of email in their products, and how product development teams can messages in their apps to nurture user engagement.

  • 10 Steps to Great Email Deliverability

    Sponsored by: SparkPost

    Tap into this resource for 10 best practices and key configuration steps to optimize your email deliverability and get your message out to the best audience.

  • Transactional Email Benchmark Report 2018

    Sponsored by: SparkPost

    Inside, uncover results from a survey conducted by SparkPost and view a snapshot of the state of transactional email in 2018, as well as 8 key findings and 5 core recommendations.

  • The Keys to Email Delivery for App Developers & Product Managers

    Sponsored by: SparkPost

    Find out why customer have increasingly come to expect smooth, cohesive experiences across devices and channels, and why email delivery is one of the top challenges for businesses trying to serve customers online.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.