Electronic Mail Management Reports

The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016

TechTarget ComputerWeekly.com

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations
sponsored by Dell EMC and Microsoft
WHITE PAPER: This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

About to Buy Guide: Spam/virus protection for Exchange
sponsored by TechTarget Security
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

TechTarget Security

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by TechTarget Security
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

TechTarget Security

Solution Brief – Virtualizing Lotus Domino on Vmware
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore the primary use cases and benefits that customers can expect when they virtualize Domino on VMware and review information on support, licensing and additional resources for customers who are looking for more information.
Posted: 04 May 2011 | Published: 04 May 2011

VMware, Inc.

How Cisco IT Deployed Enterprise Messaging on Cisco UCS
sponsored by Insight
CASE STUDY: Access this case study to examine how one organization leveraged consolidation in their Exchange environment to optimally support the latest Exchange upgrade. Learn more about the results realized, lessons learned and next steps towards effective Exchange operations.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Insight

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

Maximizing Business Email Security in Gmail
sponsored by TechTarget Security
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

TechTarget Security