RSS feed Get our RSS feed

News by Topic

email

Results 76 - 100 of 1358Sort Results By: Published Date | Title | Company Name
By: Intermedia     Published Date: Mar 01, 2016
This is a practical guide to implementing Intermedia’s Dedicated Hosted Exchange on AWS. What’s inside this guide: • A definition of Dedicated Cloud and its main benefits • Details of Intermedia’s Dedicated Exchange powered by AWS • The main benefits of the AWS platform for your business email • How can you get the cloud on your terms and not on a vendor’s terms • Steps to implement Intermedia’s Dedicated Exchange on AWS
Tags : 
     Intermedia
By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
     Butler Technologies
By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : security, threat and vulnerability management, security, cyber attacks, email, threat detection
     Proofpoint
By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
     Proofpoint
By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handels- und Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
     Proofpoint
By: Proofpoint     Published Date: Jun 12, 2017
Auch im Zeitalter der elektronischen Kommunikation unterliegen Unternehmen und Behörden umfangreichen gesetzIichen Archivierungspflichten, die sich allgemein aus dem Handelsund Steuerrecht, aber auch aus vielen spezialgesetzlichen Vorschriften ergeben.
Tags : 
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption
     Voltage Security
By: Cisco     Published Date: Oct 06, 2015
Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : email response, mobility, web chat, collaboration, management, analytics
     Cisco
By: RingCentral     Published Date: Nov 10, 2015
Mobility and Bring Your Own Device (BYOD) have transformed the idea of a 9-to-5 workplace. Employees now check their email first thing in the morning and expect to stay connected whenever and wherever they go throughout the day.
Tags : ringcentral, cloud, phone system, mobile, workforce, byod, security
     RingCentral
By: MobileIron     Published Date: Feb 05, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : mobile apps, best practices, mobiletron, phones
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : mobile apps, best practices, mobiletron, phones
     MobileIron
By: Mimecast     Published Date: Mar 13, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : 
     Mimecast
By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : security, security application, pki, authentication, internet security, security access
     Entrust Datacard
By: HPE Network Virtualization     Published Date: Jan 05, 2016
It’s simple and free! Enter your website URL to execute the test and you will receive an email with your custom 20+ page results within minutes. The report will show you exactly what is impacting your user’s experience so you can optimize to insure you are delivering amazing apps.
Tags : 
     HPE Network Virtualization
By: Movable Ink     Published Date: Oct 04, 2016
Financial Times showcased user-generated content with a live social feed in their emails. Check out our new eBook here and learn how contextual marketing can benefit your company with our top tips and tactics.
Tags : contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
Want to get better results with email? Grab our Email Marketing Guide for Financial Services. Gain insight on email campaigns, content strategies and tactics used by successful brands, plus advice from our team of experts.
Tags : contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
45% of emails are opened after an offer expires. See how Wyndham Hotels used a countdown timer to drive post-sale bookings and learn how to build best-in-class contextual email campaigns. Get our tips and tactics on building emails that see real results.
Tags : contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
Origins drove foot traffic to their stores using emails with geo-targeted store maps. See their campaign in our new guide and learn how to build best-in-class contextual email campaigns. Get our tips and tactics on building emails that see real results.
Tags : contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, e-commerce
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
33% of brands kick off holiday campaigns in October, and most of them are planning now. Grab our latest report and learn how to leverage the biggest holiday trends, including triggered emails and user-generated content.
Tags : contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
Want to see the email campaigns used by the top travel and hospitality brands? The Travel & Hospitality Email Marketer’s Playbook is packed with content strategies, tactics and expert advice to elevate your email results.
Tags : contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
HotelTonight increased conversions by 250% with location-targeted offers. Find out how they did it and discover other best-in-class examples in this season’s Inkredible 5 eBook.
Tags : contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing, internet marketing
     Movable Ink
By: Movable Ink     Published Date: Oct 04, 2016
Steve Madden wanted to promote their mobile shopping app in an email. See the campaign and learn how they increased downloads by 68% in our Inkredible 5.
Tags : contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing, e-commerce
     Movable Ink
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics