e-Mail Management Reports

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Dell Server Solutions - PowerEdge Tower Servers
sponsored by Dell, Inc. and Intel®
VIDEO: Tower Servers are ideal first servers for small businesses with the right combination of value, reliability, collaboration and data protection features to improve your business continuity and productivity. Learn more in this video which takes a look at a growing restaurant's adoption of a Dell PowerEdge Tower Server.
Posted: 12 Apr 2011 | Premiered: 12 Apr 2011

Dell, Inc. and Intel®

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell EMC and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell EMC and Microsoft

Best Practices In Enterprise Content Management: Five Tests to Evaluate Cloud Enterprise Content Management (ECM)
sponsored by SpringCM
WHITE PAPER: This paper will explore 5 tests to determine whether an organization can benefit from a Cloud ECM solution. Proven ECM technologies improve the effectiveness and efficiency of information flow in a business, ensuring the right information reaches the right person when and where they need it without compromising security of intellectual property.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

SpringCM

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Solution Brief – Virtualizing Lotus Domino on Vmware
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore the primary use cases and benefits that customers can expect when they virtualize Domino on VMware and review information on support, licensing and additional resources for customers who are looking for more information.
Posted: 04 May 2011 | Published: 04 May 2011

VMware, Inc.

Kahuna Ventures Eliminates Email PST Files and Improves Data Retention and Recovery with Metalogix
sponsored by Metalogix
WHITE PAPER: Discover how a company reduced its email volume by 50 percent and enabled faster backups and recovery with an email archiving solution. Explore the advantages of implementing this archiving system, including the ability to eliminate management of burdensome PST files and comprehensive legal retention features.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Metalogix

Top strategies to master an Exchange 2010 migration
sponsored by TechTarget Data Center
EGUIDE: Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Data Center

Enterprise Messaging That Is Agile, Simple, and Efficient: Deploy Microsoft Exchange Server 2010 on Cisco UCS
sponsored by Insight
WHITE PAPER: The resource outlines a combined refresh and upgrade strategy for Exchange Server 2010 that improves efficiency and agility of your messaging environment while reducing costs and complexity by converging your email infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Insight

Creating and Enforcing Email Security Policies
sponsored by TechTarget Security
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

TechTarget Security