RSS feed Get our RSS feed

News by Topic

email

Results 301 - 325 of 1358Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Apr 18, 2017
"Email-borne insider threats both accidental and malicious are a real and ongoing problem for organizations. A recent commissioned study conducted by Forrester Consulting reveals many firms have experienced some form of insider security incident in the past 24 months. Download this report to get the findings. Discover Forrester’s perspective on internal threats and how organizations are responding and how they should be responding."
Tags : forrester, insider security, cyber security, internal threats, email fraud
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : gdpr, email, personal data, security, data protection
     Mimecast
By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : office 365, risk mitigation, geek book, sla, cyberattacks
     Mimecast
By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : cyber resilience, petya, wannacry, cybersecurity
     Mimecast
By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : cyberthreat, healthcare, gdpr, ransomware
     Mimecast
By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : office 365, security, email security, archived data
     Mimecast
By: Mimecast     Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365. Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks. This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Tags : office 365, email security, risk assessment, security services, malware, security solutions
     Mimecast
By: Mimecast     Published Date: Oct 09, 2017
Traditional archiving no longer works for the modern business world. According to 2017 research by Vanson Bourne and Mimecast, 88% of global organizations say they’ve encountered problems with their existing archiving solution. There’s a better way. Your perfect-world archive is achievable. Download your copy of the Mimecast E-book, It’s Time to Break-Up with Your Old-School Archive to discover more eye-opening research about the state of email archiving today. In this E-book, you’ll learn: • Why legacy archiving systems don’t cut it for mobile workers • How your organization must outgrow bad archive habits to success
Tags : mimecast, legacy archiving, vanson bourne, email archiving
     Mimecast
By: Mimecast     Published Date: Feb 07, 2018
Is your healthcare organization part of the 90% that conducts annual cybersecurity assessments?* Do you wonder where your IT peers are headed with their cybersecurity plans and how they prioritize their initiatives? Recent HIMSS survey results reveal these insights and more, plus the 5 steps to improve your email security’s prognosis. This E-book contains startling facts and important cybersecurity insights every healthcare IT security leader needs to know. *HIMSS Analytics survey conducted on behalf of Mimecast, December 2017
Tags : himss, email security, email, healthcare, cybersecurity
     Mimecast
By: Insight     Published Date: May 16, 2016
This paper shows how Insight’s cloud expertise, licensing knowledge and customer engagement remove disaster recovery and compliance headaches for leading online knowledge solutions company and enable 24-hour email access for its employees.
Tags : cloud, cloud computing, cloud-based solutions, disaster recovery, insight
     Insight
By: Eloqua     Published Date: Jan 13, 2012
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation
     Eloqua
By: Eloqua     Published Date: Jan 13, 2012
Email deliverability is about maximizing the potential number of emails reaching the inbox. Privacy is about safeguarding the personal information contained in your mailing database. Download this guide to learn about privacy and deliverability.
Tags : email deliverability, email privacy, privacy and deliverability, email marketing, marketing automation, email marketing platform, digital body language, database marketing
     Eloqua
By: Silverpop     Published Date: Sep 19, 2011
With the growth of email marketing flooding inboxes, the pressure has never been greater to deliver highly compelling and creative communications programs. With more companies sending out more emails, you've got to do more to position your program above the competitive fray.
Tags : silverpop, drive renewal, cross-promote, url, landing pages, content management systems, web analytics, online video marketing
     Silverpop
By: Silverpop     Published Date: Sep 19, 2011
With more people trying to squeeze more activities into a finite amount of time, it's no wonder that people say "time is money." And for marketers with less margin for error than ever, timing is literally money. So how do you deliver the right message at the right time and ensure your revenues don't melt away faster than a clock in a Dali painting?
Tags : silverpop, email, marketing, web analytics, customer experience/engagement, email marketing services/software
     Silverpop
By: Silverpop     Published Date: Sep 19, 2011
To gain a better understanding of how today's marketers are using-and plan to use-various mocial mediums to communicate with customers, Silverpop polled more than 500 online marketers regarding their use of social, email, mobile and local forms of communication.
Tags : silverpop, marketing, customer communication, social media, customer experience/engagement, market research, email marketing services/software, social media marketing
     Silverpop
By: Silverpop     Published Date: Sep 19, 2011
The way we communicate is moving-literally. Smart phones are outselling PCs, and tablet sales are expected to outpace desktop sales by 2013. But although the screens may be smaller, the possibilities for engagement are larger than ever.
Tags : silverpop, social media, smart phones, marketing, customer engagement, market research, email marketing services/software, mobile marketing
     Silverpop
By: Silverpop     Published Date: Sep 19, 2011
"From" names and subject lines help determine whether recipients ignore, delete or open your messages. Learn what makes an effective "From" name, key factors that affect subject lines, and how mobile and social are changing the game.
Tags : silverpop, email, marketing, mobile, social media, email marketing services/software, mobile marketing, online video marketing
     Silverpop
By: Silverpop     Published Date: Sep 19, 2011
10 tips for expanding your behavioral knowledge base, shaping your content and leveraging timing so you deliver the ideal message at the perfect moment, plus real-life examples of how companies have made it happen.
Tags : silverpop, marketing, right message, email, social media, web analytics, customer experience/engagement, email marketing services/software
     Silverpop
By: Message Systems     Published Date: Mar 07, 2013
A hundred a day? A thousand a day? More? Believe it or not, many organizations send several million emails a day, and enterprises, large online retailers, social networks and gaming sites often send as much as a billion a month.
Tags : high volume email, email marketing, sending reputation, email authentication, email infrastructure, email software
     Message Systems
By: Message Systems     Published Date: Apr 29, 2013
Technology Principles for Architecting a Secure Messaging Environment
Tags : message systems, secure messaging environment, esps, solution engineering, mike hillyer, safe messaging environment
     Message Systems
By: Bronto     Published Date: Jul 19, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their businesses to keep shoppers coming back for more. Are you ready to add a few to your toolbox? In this e-book, we'll explore seven readily available commerce marketing tools and highlight the experiences of marketers using these tools to increase revenue and engagement.
Tags : commerce marketing, commerce marketers, ecommerce, subsribers, manage coupons, consumer behavior, message integration, roi
     Bronto
By: Symantec.cloud     Published Date: Nov 14, 2011
This paper discusses the many drivers for organizations looking to move email to the cloud and highlights the shortcomings of some of these solutions.
Tags : host, hosted email, security, compliance, redundancy, cloud, productivity, implement
     Symantec.cloud
By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : m86 security, data loss prevention, email, web gateway best practices, dlp policy
     M86 Security
By: M86 Security     Published Date: Dec 01, 2010
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : m86 security, social media policy, web acceptable use policies, aups, email and web security
     M86 Security
By: 8x8, Inc.     Published Date: May 13, 2013
As voice, video, and data networks meld into a single user experience, solutions that integrate phone service, unified messaging, voicemail, audio and video capabilities, rich-media conferencing, and mobility solutions are in high demand.
Tags : 8x8, voip, mobility, pbx, voice over internet protocol
     8x8, Inc.
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics