email content

Results 26 - 50 of 100Sort Results By: Published Date | Title | Company Name
By: Return Path     Published Date: Jan 31, 2013
Email marketing isn’t simple anymore. The “Email Best Practices for Mobile” podcast provides best practices and tips for marketers designing email content for both mobile and desktop viewing.
Tags : email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends
     Return Path
By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : burton group, best practices, malware, security, email security, network security, content filtering
     Burton Group
By: Smartling     Published Date: Jul 17, 2014
Today's marketing technology stack offers a simplified, streamlined view of prospects and allows marketers to automate the customer conversion process. You may have a content management system ready to generate compelling content and email and social media marketing systems poised to send that content to prospects in a timely manner. The problem is that many of them don’t speak your language.
Tags : smartling, website translation, translate website, global marketing, marketing technology, fast translation, faster translation, translation speed
     Smartling
By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
     Webroot UK
By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
     Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention
     Symantec.cloud
By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
     Attachmate
By: Movable Ink     Published Date: May 05, 2014
Each season, the Movable Ink team looks back at recent campaigns and honors five brands for creating engaging agile email marketing experiences that stood out in the inbox. Download the Spring 2014 edition of The Inkredible Five to see standout emails from brands like Lilly Pulitzer, The Wall Street Journal, and 7 For All Mankind.
Tags : agile, email, dynamic content, live content in email, crm, real time, marketing, innovative
     Movable Ink
By: Uberflip     Published Date: Jun 30, 2017
This eBook aims to provide you with an advanced understanding of content distribution in the B2B space, as well as provide an inside look at the tactics and channels (including social, organic search, email, and paid programs) you need to be leveraging to effectively distribute your content to your audience.
Tags : content distribution, ebook, delivery, channels, goals
     Uberflip
By: IBM     Published Date: Jun 15, 2009
Small and Mid-market customers struggle to meet ever mounting e-mail archiving requirements and associated compliance demands - often with a limited I/T staff and within strict budgetary guidelines. Compliance requires eMail to be retained more stringently and for longer periods of time - fueling existing challenges of eMail management. Learn more today!
Tags : email archiving, e-mail, compliance, mid-sized, mid-market, email management, ibm, ibm commonstore
     IBM
By: IBM     Published Date: Oct 23, 2009
The e-kit, "Collaboration solutions for a more flexible work environment," includes white papers, webcasts, a demo and more.
Tags : productivity, ibm, security, email, business applications platform, content managemaent, lotus
     IBM
By: Proofpoint     Published Date: Apr 23, 2010
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Tags : proofpoint, encrypted email, secure file transfer, data breach prevention, encryption
     Proofpoint
By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence
     Proofpoint
By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold
     Proofpoint
By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
     YouSendIt
By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
     YouSendIt
By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
     YouSendIt
By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
     YouSendIt
By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
     YouSendIt, Inc.
By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
     YouSendIt, Inc.
By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
     YouSendIt, Inc.
By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
     YouSendIt, Inc.
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
     Trend Micro SaaS
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com