e-Mail (Communications) Reports

Maximizing Business Email Security in Gmail
sponsored by TechTarget Security
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

TechTarget Security

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual

Cisco Unified Computing System: Meet the Challenges of Today’s Microsoft Exchange Server Workloads
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explores the challenges of upgrading Microsoft Exchange and explains why it is essential that you successfully coordinate between server, storage, and network stacks to ensure stable business operations. Read this white paper to learn how a unified computing system can help you achieve this goal.
Posted: 11 Jan 2012 | Published: 11 Jan 2012

Cisco Systems, Inc.

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving
sponsored by IBM
CASE STUDY: This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Email archiving in Exchange: How to beat its limitations with a successful strategy
sponsored by Metalogix
EGUIDE: Discover how to successfully overcome the limitations of native Exchange 2010 archiving tools in this expert e-guide. Plus, gain insight into the key considerations to keep in mind when creating a smart email retention strategy.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Metalogix

Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
sponsored by TechTarget Data Center
EBOOK: While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

TechTarget Data Center

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Guide for migrating to Exchange 2010
sponsored by Microsoft
EGUIDE: Before migrating to any email server, it is important to confirm that you meet the prerequisites, including having sufficient hardware—and this holds true when considering migrating to Exchange Server 2010. Ensure you are prepared for this migration and learn more here.
Posted: 09 May 2011 | Published: 09 May 2011

Microsoft

e-Zine: Purchasing Considerations for Exchange 2010
sponsored by Dell EMC and Microsoft
EZINE: Find out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade.
Posted: 23 Apr 2012 | Published: 18 Apr 2012

Dell EMC and Microsoft

Improving Enterprise Email Security: Systems and Tips
sponsored by TechTarget Security
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

TechTarget Security