RSS feed Get our RSS feed

News by Topic

xchange

Results 301 - 325 of 401Sort Results By: Published Date | Title | Company Name
By: F5     Published Date: Jan 25, 2013
Microsoft Exchange 2013 offers ways to meet productivity challenges but presents changes your infrastructure. This F5 paper takes a closer look at how the migration affects your infrastructure and offers strategies for ensuring a smooth transition.
Tags : architect, f5 networks, migration, network migration, smooth transition, network mobility, byod, bring your own device
     F5
By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
     SilverSky
By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center
     SilverSky
By: SilverSky     Published Date: Mar 26, 2014
In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.
Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange
     SilverSky
By: IBM     Published Date: Oct 01, 2013
The new IBM System x3650 servers provide the power midmarket customers need to improve the performance of mission-critical applications, such as Microsoft Exchange, while offering dramatic cost savings and environmental customer benefits.
Tags : ibm, ibm system x, ibm system x m4, ibm system x m4 servers, servers, midmarket, applications, storage
     IBM
By: Vocus     Published Date: Apr 09, 2014
Explore Facebook’s newer features and some actionable best practices in this guide, and you’ll connect with more customers, as well as improve your Facebook marketing.
Tags : vocus, marketing, social marketing, social media, facebook, facebook exchange, fbx, retargeting
     Vocus
By: Microsoft Office 365     Published Date: Sep 26, 2017
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ study to examine the potential return on investment (ROI) businesses can receive through the deployment of Office 365. To better understand the benefits, costs, and risks associated with an Office 365 implementation, we interviewed four existing customers and surveyed 72 midsized organizations (with 150 to 2,000 users) about the use of Microsoft business products the SaaS platform, including Office Professional Plus, Exchange, Skype for Business (formerly Lync), SharePoint, Yammer, and OneDrive. Our research found that a sample composite organization (which switched from an on-premises 2010 version solution to Office 365) had total present value benefits of $3.4 million versus total present value costs of $1.3 million, resulting in a net present value (NPV) of $2.1 million.
Tags : 
     Microsoft Office 365
By: Cisco     Published Date: Feb 16, 2016
Since the 1990s, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate communications. Each day, more than 100 billion corporate email messages are exchanged.1 Security has naturally become a top priority. But mass spam campaigns are no longer the only security concern.
Tags : cisco, email threat, data, data security, information security, security
     Cisco
By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Verio     Published Date: Jul 08, 2011
Discover the advantages of a managed server and learn what to look for when shopping for a managed private server provider.
Tags : verio, colocation, private server provider, demand, managed server, network management, microsoft exchange, service management
     Verio
By: Verio     Published Date: Jul 25, 2011
Learn the risks associated with using the POP and free email systems and how a hosted Microsoft Exchange solution can provide guaranteed availability and make email users in even the smallest businesses much more productive.
Tags : verio, microsoft exchange solution, pop, free email systems, availability, email reliability, hosted exchange, collaboration
     Verio
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware AirWatch Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with VMware AirWatch, as well as conduct a Q&A session.
Tags : 
     VMware
By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security
     Quest Software
By: Quest Software     Published Date: Oct 02, 2012
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity.
Tags : compliance, quest, centralized monitoring, reporting, productivity
     Quest Software
By: CBIZ     Published Date: Aug 27, 2013
With so many provisions and rules involved in the Affordable Care Act, it’s easy to get confused about what takes effect when. This timeline covers from 2010 through 2018 in a clear, 1-page layout. It also indicates what provisions apply to all plans and those which apply only to non-grandfathered plans.
Tags : timeline, aca timeline, patient-centered outcome research fee, fsa cap, summary of benefits coverage, notice of marketplace options, health care reform, affordable care act
     CBIZ
By: CBIZ     Published Date: Aug 27, 2013
Are you prepared for health care reform? This 3-page checklist guides you through the general compliance requirements of the Affordable Care Act (ACA) to help you prepare now for 2014 and beyond. The checklist is broken down into five categories: 1. Health Plan Action Items; 2. Employer Tax Changes; 3. Fees and Filings; 4. Shared Responsibility Employer Preparation; and 5. ACA Provisions beyond 2014.
Tags : health care reform, health reform checklist, affordable care act, aca, shared responsibility, grandfathered, waiting period, summary of benefits and coverage
     CBIZ
By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : ransomware, malware, encryption, cyberthreat
     Kaspersky
By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Riverbed     Published Date: Aug 22, 2014
Secure, Intelligent, WAN Optimization for Microsoft Exchange Server 2013.
Tags : secure, intelligent, optimization, exchange server
     Riverbed
By: HP     Published Date: May 14, 2014
The world is moving rapidly towards a New Style of IT, and will leave behind any business that doesn’t adapt even more rapidly. Is your storage ready? Learn how HP 3PAR StoreServ Storage is the only primary storage architecture you will ever need—regardless of whether you are a midsize enterprise experiencing rapid growth in your virtualized Microsoft® Exchange, Microsoft SQL, or Oracle Database environment, a large enterprise looking to support IT as a Service (ITaaS), or a global service provider building a hybrid/private cloud.
Tags : 3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
     HP
By: HP     Published Date: Sep 04, 2014
National Stock Exchange decreases latency by 50% with the help of HP 3PAR StoreServ Storage and HP ProLiant servers after evaluating storage and server solutions from several vendors to determine which could offer the best performance and availability to support the proprietary, next-generation trading platform.
Tags : stock exchange, latency, storage, 3par, proliant, trading platform
     HP
By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : security, operations, affordability, av labs, open threat, exchange, analyst, report
     AlienVault
By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, security
     OpenText
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics