RSS feed Get our RSS feed

News by Topic

email

Results 1 - 25 of 1193Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
     Proofpoint
By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : b2b integration, customer loyalty, ibm, customer growth
     IBM
By: Mimecast     Published Date: Apr 18, 2017
"Your organization can’t survive without email. In turn, the data held within email is an invaluable resource for compliance, e-discovery and workflow efficiency purposes. And moving to the cloud involves its own set of challenges around preserving that content. It’s time to rethink archiving. Download our E-book, 5 Essentials for Cloud Archiving Success, to learn: - How to avoid common misconceptions about cloud email archiving - Ways to enable employee efficiency and productivity through archiving - Why every organization must be prepared for e-discovery and litigation "
Tags : cloud, cloud archiving, email archiving, litigation
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : email security, email fraud, whaling, mimecast, loss prevention
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"With over 112 billion emails sent and received on a daily basis, email continues to be the dominant form of business communication. Organizations must formulate a strategy for not just storing email but meeting compliance requirements, responding to litigation requests and providing instant access to these important conservations. While this has traditionally been accomplished with on-premises technology, the cloud has transformed archiving by delivering new capabilities at lower costs. Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : email archiving, cloud, cloud based infrastructure, cyber security, cloud security
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : email fraud, threat protection, mimecast, cyber security, email security
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture. When considering a move to Office 365, organizations must be aware of several significant risks to their email infrastructure. The cloud may seem like a simple, cost-effective alternative to on-premises email, but continuity and security issues cannot be overlooked. Download the E-book to learn more about how to avoid cloud email headaches."
Tags : office 365, email security, cloud, cloud security, email infrastructure
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : email security, ransomware, phishing, whaling, security strategy
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : forrester, cloud security, email security, cloud-based email, cloud environment
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Looking to achieve regulatory compliance? Legal risk mitigation? Information governance? Workflow efficiency imperatives? Download this white paper from Enterprise Management Associates (EMA) for a checklist for evaluating email archiving solutions. This white paper also provides insights offered by IT professionals about their experiences with Mimecast and the cost savings experienced."
Tags : email archiving, mimecast, risk mitigation, information governance
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your organization is already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : mimecast, office 365. email communication, email security, client communication
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Email-borne insider threats both accidental and malicious are a real and ongoing problem for organizations. A recent commissioned study conducted by Forrester Consulting reveals many firms have experienced some form of insider security incident in the past 24 months. Download this report to get the findings. Discover Forrester’s perspective on internal threats and how organizations are responding and how they should be responding."
Tags : forrester, insider security, cyber security, internal threats, email fraud
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Not all email security systems perform the same. Lots of false negatives get let through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of incumbent email security systems to uncover the number, type and severity of threats getting into organizations. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss."
Tags : mimecast, email security, cyber security, email fraud, organizational threats
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : gdpr, email, personal data, security, data protection
     Mimecast
By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system
     Bell Micro
By: eDataSource     Published Date: May 08, 2017
Learn how other email marketers are dealing with growing SPAM rates and driving positive ROIs for their marketing efforts.
Tags : edatasource, email marketing, performance insight, email delivery rates
     eDataSource
By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : client engagement, data security, confidential data, data protection, email security, customer service
     Citrix ShareFile
By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
     AppNexus
By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
     Time Warner Cable Business Class
By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
     Time Warner Cable Business Class
By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
     Time Warner Cable Business Class
By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
     Time Warner Cable Business Class
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics