• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Email Management
flow-image
C2C Systems

F500 Insurance Services: PST Enterprise Speeds Integration of Merged Companies

Download this white paper to see how the customer can utilize PST Enterprise to centralize email for their new end user base without interruption to the end users themselves.

Published: Apr 24, 2013
View More
flow-image
Monetate

8 Steps to Get Buy-in for a Website Testing Program

Effective website testing provides critical and credible information that can move your business forward. Unfortunately, many marketers still face roadblocks presented by reluctant or skeptical management teams or IT departments.  This white paper presents a specific plan on how to convince your company’s...

Published: Sep 30, 2014
View More
flow-image
C2C Systems

Tips for a Successful PST Elimination Project

Download this white paper specifically looking at PST elimination budgeting and justification, which will provide guidance across the steps we typically see customers taking to effectively budget and gain buy-in for PST elimination projects.

Published: Apr 24, 2013
View More
flow-image
ESET

Rethinking endpoint and email security for the BYOD era

The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own. In a survey of...

Published: Jul 18, 2013
View More
flow-image
Cisco

Email Security Using Cisco ESA - Technology Design Guide

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...

Published: Jan 16, 2014
View More
flow-image
OpenText

OpenText Secure Mail: Email Encryption Simplified and Integrated

OpenText Secure Mail is a cloud-based secure messaging solution for encrypting, tracking, and preventing the leak and interception of confidential information. 

Published: Oct 18, 2013
View More
flow-image
Cisco

Cisco Email Security At A Glance

Hackers and malware use multiple sophisticated strategies and technologies to infiltrate, disrupt, and steal your valuable information or resources. To protect your email, you must do the same. Now you can quickly and easily add Advanced Malware Protection (AMP), providing malware detection and blocking, continuous analysis,...

Published: Jun 16, 2014
View More
flow-image
Mimecast

The Total Economic Impact Of Mimecast's Unified Email Management (UEM) Solution

Mimecast delivers a software-as-a-service (SaaS)-based enterprise email management solution that complements the client’s existing on-premises email infrastructure. It provides services including antispam, antimalware, archiving, eDiscovery, continuity, and policy management. For a more detailed overview of...

Published: May 15, 2014
View More
flow-image
Dyn

A Guide to Transactional Email

Whether we’ve realized it or not, everyone with an email account has received a transactional email, otherwise known as the alert that Bob accepted your friend request, the receipt for the days-of-the-week socks you just bought online, or even a welcome email for signing up for that new deal of the day website. ...

Published: Mar 27, 2014
View More
flow-image
Mimecast

The Importance of Continuity in Office 365 Environments

This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.

Published: May 15, 2014
View More
flow-image
Carbon Black

Advance Your Ransomware Defenses

Ransomware isn’t new. In fact, it’s 30-years-old . What IS new is ransomware’s sudden rise as a favored attack by cyber criminals . Cyber crime has become a lucrative business and, unfortunately, ransomware has become an integral attack method that many organizations are fighting a losing battle against. ...

Published: Aug 02, 2019
View More
flow-image
Dell

The Move to Exchange 2013: Migraine or Migration?

Migration of your most precious business asset, that which is mission-critical for the success of the company on so many levels—your Exchange messaging solution—is not something to be taken lightly. Some call it migrating, or upgrading or transitioning with a period of coexistence, but regardless of the...

Published: Jun 02, 2014
View More
flow-image
Cisco

Mitigating Email Virus Attacks

Each day, over 100 billion corporate email messages are exchanged. With email at the heart of businesses, security is a top priority. Email-based threats are more organized, targeted, and dangerous than ever before and the costs of security breaches nullify any short-term savings gained from settling for basic protection....

Published: Jun 16, 2014
View More
flow-image
Malwarebytes

Cybercrime tactics and techniques

2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to a resurgence of randsomare logdged against corporate targets, cybercriminals are going after organizations with a vengence. Read the Cybercrime Tactics and Techniques Q1 2019 Report to learn more about the current state...

Published: Jul 26, 2019
View More
  •  
  •  
  • 1
  • 2
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x