Skip to main content
 

mail server

Results 1 - 25 of 103Sort Results By: Published Date | Title | Company Name
Published By: Veeam '18     Published Date: May 07, 2019
Wie wir inzwischen alle wissen, müssen unsere Abwehrmechanismen nur bei einer einzigen Phishing-E-Mail versagen, und schon ist unser Tag ruiniert. Nur ein Klick und der Angreifer ist in Ihrem Netzwerk, kann auf Endgeräte zugreifen und diese mit Malware infizieren, kann kritische Server unter seine Kontrolle bringen, Daten stehlen, unsere Bankkonten leerräumen oder dem Unternehmen anderweitig schaden.
Tags : 
    
Veeam '18
Published By: Mimecast     Published Date: Nov 26, 2018
If you are among the IT professionals feeling a little uneasy about relying solely on the email security provided by Microsoft in Office 365™, you are not alone. Here’s the good news, you can regain the same sense of security that you had when you were managing email servers on-premises with the right third-party solution. TechTarget summarizes how you can easily and effectively realize the benefits of Office 365 with a complementary third-party solution that can not only mirror the kind of layered security built for on-premises solutions, but also ensure uninterrupted access to Office 365 email, even if it crashes.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
office 365, risk mitigation, geek book, sla, cyberattacks
    
Mimecast
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos
Published By: Dell     Published Date: May 13, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel Xeon processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: May 12, 2016
Businesses using multiple outdated servers for email, database, file and print workloads can benefit greatly by consolidating these workloads onto a single new server and running them in virtual machines. Read this paper and learn how the latest servers powered by Intel® Xeon® processors, can help you free up data center space, reduce power consumption and lower TCO.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 12, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel® Xeon® processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
    
Dell EMC
Published By: Polycom     Published Date: Sep 15, 2015
UC—the concept of streamlining phone, email, chat, video and content collaboration—has become a corporate objective for reducing the cost and complexity of communications and increasing employee productivity. What began more than 10 years ago as a hardware-driven effort to combine PBX systems, computer servers and video infrastructure is now evolving to include software-enabled processes and functionality.
Tags : 
collaboration, communications, conferencing, enterprise, lync, microsoft, phone, polycom, skype, voice over ip
    
Polycom
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : 
best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business, website, threats, coverage
    
Entrust Datacard
Published By: Polycom     Published Date: Sep 24, 2014
Unified communications (UC) has been a market in the making for well over a decade, as companies look to improve corporate collaboration. UC, the concept of streamlining phone, email, chat, video and content collaboration, has become a corporate objective for reducing the cost and complexity of communications and increasing employee productivity. What began 10 years ago as a hardware-driven effort to combine PBX systems, computer servers and video infrastructure, is now evolving to include software-enabled processes and functionality.
Tags : 
improving, collaboration, business, corporate, lync, video, content, objective, communication, chat, complexity, cost, market, unified, employee, productivity, email, hardware
    
Polycom
Published By: HP     Published Date: Aug 26, 2014
Get safe, secure always-on access to email, calendar, and contacts almost anywhere, from almost any device. HP Flex-Bundles for Microsoft® Exchange Server 2013 are Microsoft Exchange ready, affordable business email packages that combine the world’s most intelligent servers—HP ProLiant Gen8 servers—with high-performance Intel® processors, HP software, and Microsoft Windows® operating system software to get you started—and keep you moving—on your IT infrastructure journey. HP ServeIT Flex-Bundles, built upon the HP ProLiant ML350p Gen8 server and Microsoft® Exchange Server 2013, provide pre-defined configurations that can improve your productivity by enhancing accessibility to email, calendars, and contacts while simplifying IT management. Learn more.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution, improve, exchange, accessibility, management, system, contacts, device, performance, infrastructure
    
HP
Published By: Riverbed     Published Date: Aug 19, 2014
Microsoft® Exchange Server has become the corporate standard in email, calendaring, and workforce productivity. As a result, significant time and IT resources go into creating a robust, reliable, high-performance Exchange environment. IT departments regularly consider deploying additional exchange servers, moving servers to branch offices, and even adding more bandwidth in order to improve Exchange performance.
Tags : 
security, wan, optimization, workforce, productivity, bandwidth
    
Riverbed
Published By: NEC     Published Date: Aug 12, 2014
By now, much has been written about the advantages server virtualization brings to an enterprise. In the June 2013 survey, 63% of all companies and 100% of large enterprises reported having a server virtualization program. However, when you segment the virtualization rates, you find a trend that indicates that large enterprises in particular are not gaining all of the advantages that server virtualization has to offer. What is more difficult and remains a challenge, particularly for large enterprises, is virtualizing Tier 1 applications. These are large, mission-critical enterprise applications such as email, customer relationship management (CRM), or enterprise resource planning (ERP). These applications tend to be very large, consume the entire capacity of a current generation server, and require high application uptimes. As shown in Figure 1, the virtualization rates for these applications are far lower than Tier 2 apps. In this eBook, you’ll learn how the NEC enterprise server provides a platform that now gives customers the right platform to virtualize their Tier 1 apps.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, architecture, express, stress
    
NEC
Published By: Ipswitch     Published Date: May 15, 2014
In this free on demand webinar, you’ll get a first-hand look at how leading companies leverage Managed File Transfer to improve security, reduce risk and relieve pressure on their IT departments.
Tags : 
ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer    , ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
    
Ipswitch
Published By: HP     Published Date: May 14, 2014
Email has been a mission-critical application for years and at the heart of organizations' communications and business practices. From an architecture perspective, email has frequently been walled off, sitting on separate servers and using separate back-end storage systems. With advances in server hardware and the rise of virtualization, this appears to be changing. Read this Forrester Consulting paper to learn the key considerations for what will work best within your email environment to improve storage management and/or lower storage costs in your firm.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: Ipswitch     Published Date: May 02, 2014
With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.
Tags : 
ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer    , ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
    
Ipswitch
Published By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint
    
Nimble Storage
Published By: Mimecast     Published Date: Oct 17, 2013
In this video, Matt Cain, Vice President and lead e-mail analyst at Gartner, outlines some of the options available to CIOs, including running hybrid e-mail environments with tried and tested services delivered from the cloud but the Exchange server remaining onsite. Matt also discusses where Office 365 currently meets the needs of enterprise customers and where third-party services should be considered to augment its functionality in key areas.
Tags : 
mimecast, cloud email, unified email management, office 365, secure email, mobile workforce, matt cain, migration services, mounil patel, email ecosystem, email infrastructure, core communication, email to cloud, customization and integration, cloud computing
    
Mimecast
Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data
    
Symantec Corporation
Published By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption
    
Thawte
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci
    
McAfee
Published By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
exchange 2010, ssl certificates, ssl, exchange implementation, sans, security
    
Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.