e-Mail (Communications) Reports

Virtualizing your Exchange Server: Fact vs. fiction
sponsored by TechTarget Data Center
EBOOK: Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

TechTarget Data Center

E-Guide: Top Considerations for Migrating to Exchange 2010
sponsored by Metalogix
EGUIDE: In this expert e-guide, discover what you need to know before migrating to Exchange Server 2010. Explore the new features and tools that Exchange boasts, and which features will not longer be supported. Find out the important prerequisites you'll need before making the transition.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Metalogix

Improve Enterprise Email Systems with HP Messaging Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
Posted: 04 Sep 2014 | Published: 30 Apr 2013

Hewlett-Packard Enterprise

Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
sponsored by TechTarget Data Center
EBOOK: While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

TechTarget Data Center

Cisco Unified Computing System: Meet the Challenges of Today’s Microsoft Exchange Server Workloads
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explores the challenges of upgrading Microsoft Exchange and explains why it is essential that you successfully coordinate between server, storage, and network stacks to ensure stable business operations. Read this white paper to learn how a unified computing system can help you achieve this goal.
Posted: 11 Jan 2012 | Published: 11 Jan 2012

Cisco Systems, Inc.

Creating and Enforcing Email Security Policies
sponsored by TechTarget Security
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

TechTarget Security

Dell Server Solutions - PowerEdge Blade Servers
sponsored by Dell, Inc. and Intel®
VIDEO: Blade servers are great for businesses that require much larger computing capacity for performance-intensive business-critical applications. Blade Servers allow your business to add significant performance in an energy efficient and easily managed form factor. Learn more about Dell PowerEdge Blade Servers in this video.
Posted: 12 Apr 2011 | Premiered: 12 Apr 2011

Dell, Inc. and Intel®

The future of email and applications is social
sponsored by IBM
WHITE PAPER: While it's difficult to imagine a workplace without email, today many businesses are coping with information overload. Email is a key factor of business collaboration tools, so businesses need to find a way to modify information management. View this white paper to learn more about what the future of email application entails.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

IBM

IBM SmartCloud Email Management Express: Help protect critical email communication through advanced email management service options
sponsored by IBM
DATA SHEET: How your organization handles planned and unplanned email outages can mean the difference between business-as-usual and serious damage to your overall productivity, profitability and reputation. This data sheet describes how IBM can help you protect, archive and manage your mission-critical data and applications.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

IBM

Email Security Technical Guide
sponsored by TechTarget Security
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

TechTarget Security