e-Mail Software Reports

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Presentation Transcript : Using Exchange Server 2007 for Voicemail
sponsored by Microsoft
PRESENTATION TRANSCRIPT: Read this paper to learn the basics of unified communications deployment, unified messaging and office communications server deployment, and the features offered by these technologies.
Posted: 17 Dec 2008 | Published: 17 Dec 2008

Microsoft

Lloyd Gosselink Rochelle & Townsend Ensure Reliable, Constant, E-mail Services with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: The network administrators at Lloyd Gosselink Rochelle & Townsend, PC have taken many steps to ensure reliable, constant, e-mail services. Like any law firm, e-mail is a central application and protecting the e-mail system is a central function of information services. One of the most important steps was implementing Replay AppImage.
Posted: 09 Jun 2009 | Published: 01 Jun 2009

AppAssure Software, Inc.

AppAssure makes Network Administrator "Hero of the Day"
sponsored by AppAssure Software, Inc.
CASE STUDY: Before implementing AppAssure's MailRetriever, Imagine's Exchange environment suffered unrecoverable corruption. During the ensuing downtime, the network administrators searched for a better backup solution. Imagine Schools now relies on MailRetriever for Exchange to backup Exchange, SQL servers, and school Web sites.
Posted: 09 Apr 2009 | Published: 09 Apr 2009

AppAssure Software, Inc.

Best Practices: Dell Compellent Storage Center Microsoft Exchange Server 2010
sponsored by DellEMC and Intel®
WHITE PAPER: This comprehensive whitepaper serves as a best practice guideline when configuring and using Microsoft Exchange Server 2010.
Posted: 22 Oct 2013 | Published: 26 Jan 2012

DellEMC and Intel®

University Uses Hosted Collaboration Solution to Enhance Learning and Strengthen Community
sponsored by Microsoft
CASE STUDY: St. John's University wanted to implement a communication and collaboration system capable of meeting the needs of its students' digital lifestyles. The University replaced its Unix-based e-mail solution for students with Microsoft® Live@edu.
Posted: 17 Jul 2009 | Published: 01 Oct 2008

Microsoft

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
sponsored by TechTarget Data Center
EBOOK: While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

TechTarget Data Center

Try LotusLive
sponsored by IBM
SOFTWARE DOWNLOAD: Sign up for a no charge 30-day trial of LotusLive Engage from IBM.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

IBM

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by TechTarget Security
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

TechTarget Security