RSS feed Get our RSS feed

News by Topic

email

Results 76 - 100 of 1410Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Oct 17, 2013
Macmillan Cancer Support has relied on Mimecast for robust email security backed by a 100% anti-virus and 99% antispam SLA for a number of years. Mimecast’s Email Security solution has solved a spam issue that was seriously affecting Macmillan’s email system performance and creating a significant management burden for the charity’s IT department.
Tags : mimecast, macmillan cancer support, email security solution, banish spam, case study, email system performance, it departments, spam problems
     Mimecast
By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact
     Mimecast
By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365
     Mimecast
By: Mimecast     Published Date: Oct 17, 2013
In this video, Matt Cain, Vice President and lead e-mail analyst at Gartner, outlines some of the options available to CIOs, including running hybrid e-mail environments with tried and tested services delivered from the cloud but the Exchange server remaining onsite. Matt also discusses where Office 365 currently meets the needs of enterprise customers and where third-party services should be considered to augment its functionality in key areas.
Tags : mimecast, cloud email, unified email management, office 365, secure email, mobile workforce, matt cain, migration services
     Mimecast
By: Mimecast     Published Date: Oct 29, 2013
Don’t just store information. Use it. Mimecast makes your email archiving work harder for business advantage.
Tags : mimecast, email, interactive archive, email archiving, interaction platforms, email platforms, ediscovery, data loss prevention
     Mimecast
By: Smart Technologies     Published Date: Dec 11, 2015
In this whitepaper, learn how corporate culture is the key to unlocking effective collaboration. Most users are effective at driving more meetings, more emails and more interactions but the question is… are we collaborating better?
Tags : culture, collaboration, strategy
     Smart Technologies
By: Intermedia     Published Date: Mar 01, 2016
This is a practical guide to implementing Intermedia’s Dedicated Hosted Exchange on AWS. What’s inside this guide: • A definition of Dedicated Cloud and its main benefits • Details of Intermedia’s Dedicated Exchange powered by AWS • The main benefits of the AWS platform for your business email • How can you get the cloud on your terms and not on a vendor’s terms • Steps to implement Intermedia’s Dedicated Exchange on AWS
Tags : 
     Intermedia
By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
     Butler Technologies
By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : security, threat and vulnerability management, security, cyber attacks, email, threat detection
     Proofpoint
By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
     Proofpoint
By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
     Proofpoint
By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption
     Voltage Security
By: Cisco     Published Date: Oct 06, 2015
Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : email response, mobility, web chat, collaboration, management, analytics
     Cisco
By: RingCentral     Published Date: Nov 10, 2015
Mobility and Bring Your Own Device (BYOD) have transformed the idea of a 9-to-5 workplace. Employees now check their email first thing in the morning and expect to stay connected whenever and wherever they go throughout the day.
Tags : ringcentral, cloud, phone system, mobile, workforce, byod, security
     RingCentral
By: MobileIron     Published Date: Feb 05, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : mobile apps, best practices, mobiletron, phones
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : mobile apps, best practices, mobiletron, phones
     MobileIron
By: Mimecast     Published Date: Mar 13, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : 
     Mimecast
By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : security, security application, pki, authentication, internet security, security access
     Entrust Datacard
By: HPE Network Virtualization     Published Date: Jan 05, 2016
It’s simple and free! Enter your website URL to execute the test and you will receive an email with your custom 20+ page results within minutes. The report will show you exactly what is impacting your user’s experience so you can optimize to insure you are delivering amazing apps.
Tags : 
     HPE Network Virtualization
By: Movable Ink     Published Date: Oct 04, 2016
Financial Times showcased user-generated content with a live social feed in their emails. Check out our new eBook here and learn how contextual marketing can benefit your company with our top tips and tactics.
Tags : contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
Want to get better results with email? Grab our Email Marketing Guide for Financial Services. Gain insight on email campaigns, content strategies and tactics used by successful brands, plus advice from our team of experts.
Tags : contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics