ssa

Results 526 - 550 of 1720Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: Port25 Solutions     Published Date: Mar 23, 2012
Find out how PowerMTA from Port25 Solutions, Inc., helps MailChimp deliver over 25 Million emails daily.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Port25 Solutions     Published Date: Mar 23, 2012
After evaluating PowerMTA from Port25 Solutions, smartFocus' digital messaging objectives for enhanced inbox placement became a reality. Read the full case study to find out what Port25 can do for you and your business too!
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Port25 Solutions     Published Date: Mar 09, 2012
This Whitepaper will attempt to address some frequently asked questions about the core differences between open source MTAs and commercial MTAs. It will also explain why making the switch may qualify as long term cost-effective investment.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Port25 Solutions     Published Date: Mar 09, 2012
Today's enterprise environments need fast, reliable and immediate execution of email messaging flow. And to successfully achieve greater deliverability, proven technologies need to be in place to optimize the messaging infrastructure.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload
    
4Retail
Published By: Iterable     Published Date: Sep 07, 2018
Email marketing continues to be the best digital channel for ROI, so delivering dynamic, personalized messaging to the inboxes of your customers is of the utmost importance. In fact, for 77 percent of consumers, email is the preferred messaging channel, dwarfing demand for SMS, push notifications and social media communications. When you are determining the right email marketing strategy for your business, it’s natural to wonder how the industry leaders are conducting their campaigns. A¬er all, if they’re on top, then they must be doing everything right...right? To glean best practices, we analyzed the email marketing strategies adopted by the top 100 e-retailers in the United States to study how they engage with their customers. These companies represent industries ranging from apparel and electronics, to auto parts and pet supplies, but all have the single goal of getting their users to go from inbox to checkout. We note what companies are doing across the board, as well as what spec
Tags : 
    
Iterable
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email
Tags : 
messagelabs symantec hosted services, email, security, botnets
    
Symantec.cloud
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: GoToMeeting     Published Date: Oct 06, 2011
Want to connect with today's phone-averse, time-starved prospects? Use email. Sure, most emails get deleted upon arrival, but that's because most emails aren't written right. Watch this on-demand webinar to learn from sales expert Jill Konrath as she explores how to craft an email message that grabs the attention of prospects and compels them to continue the conversation.
Tags : 
citrix, marketing, prospects, email, email marketing, webinar
    
GoToMeeting
Published By: Port25 Solutions     Published Date: Mar 09, 2012
PowerMTA has the ability to use the reputation of an existing IP address to warm up a new IP.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance
    
MessageLabs
Published By: MessageLabs     Published Date: Jan 13, 2009
Spam, viruses and other malware pose a serious threat to your business.  Is your email security accurate enough to protect you?Re-evaluate your solution FREE Email Security Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, email security, email security buyer’s guide, spam, viruses, malware
    
MessageLabs
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management
    
Intermedia
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration
    
Alt-N Technologies
Published By: Dell EMC     Published Date: Mar 18, 2016
The EMC Isilon Scale-out Data Lake is an ideal platform for multi-protocol ingest of data. This is a crucial function in Big Data environments, in which it is necessary to quickly and reliably ingest data into the Data Lake using protocols closest to the workload generating the data. With OneFS it is possible to ingest data via NFSv3, NFSv4, SMB2.0, SMB3.0 as well as via HDFS. This makes the platform very friendly for complex Big Data workflows.
Tags : 
emc, emc isilon, data lake, storage, network, big data
    
Dell EMC
Published By: Port25 Solutions     Published Date: Mar 23, 2012
As the chief crisis management solution nationwide, it is essential that eAlert utilizes a delivery system with maximum reliability, delivery performance, and reporting features to meet its clients' demands - PowerMTA was the only SMTP software flexible enough to supply these necessary features and easily integrate into eAlert's current system without interruption.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Trapit     Published Date: Apr 06, 2015
In the past, simply having a presence on social media was enough for many companies. But social networking sites are changing, and so are buyers. Potential customers want to hear messages tailored specifically for them, and they want to hear those messages from someone they can trust. To maximize the potential of social media, today's marketers have to change their strategies. That's where employee advocacy comes in.
Tags : 
trapit, employee advocacy, employee marketer, social networking, brand advocation
    
Trapit
Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection, id theft, employee, ex-employee, ex employee, fraud, employee fraud, actimize
    
Actimize
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software
    
Deep Software
Published By: TriNet     Published Date: Jul 21, 2010
This white paper outlines how managers can determine whom to keep, how to treat those who leave, and what to do to retain those necessary to the organization.
Tags : 
trinet, employee retention, hr outsourcing service, human resource
    
TriNet
Published By: TriNet     Published Date: Jul 22, 2010
This white paper outlines how managers can determine whom to keep, how to treat those who leave, and what to do to retain those necessary to the organization.
Tags : 
trinet, employee retention, hr outsourcing service, human resource
    
TriNet
Published By: TriNet     Published Date: Jul 22, 2010
This white paper outlines how managers can determine whom to keep, how to treat those who leave, and what to do to retain those necessary to the organization.
Tags : 
trinet, employee retention, hr outsourcing service, human resource, insurance, credit, mortgage/real estate, energy, options, commodities, marketing, capital, benefits, technology
    
TriNet
Published By: MessageLabs     Published Date: Jan 13, 2009
Drawing the line between employee web usage and company policy is challenging for IT Managers. Download this whitepaper to help make informed decisions about your own web monitoring requirements FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, employee web use, employee web misuse, employee web surfing, employee internet usage, web use monitoring, web use blocking
    
MessageLabs
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Resource Library