Mailbox Management Reports

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual

Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security
sponsored by TechTarget Security
EZINE: In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security

Definitive Guide to Exchange Server 2010 Migration Chapter 5: Exchange 2010: Keeping up Appearances
sponsored by Mimecast
EGUIDE: Keeping Exchange Server 2010 running at full torque requires diligent management and administration. This e-guide examines some of the most common performance issues and explains how to mitigate them. Exchange MVP Andy Grogan also details best practices you should follow to prevent any performance setbacks.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

Mimecast

Seven Questions to Determine if E-mail Archiving, Migration, or Both, Are Right for You
sponsored by Dell Software
WHITE PAPER: This Quest Software white paper discusses seven important questions you should ask before migrating to Microsoft Exchange - and how these questions can help you determine which solution will help to make your migration project exceptional.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

Dell Software

Exchange Server 2010: Migration considerations and best practices
sponsored by DellEMC and Intel®
EGUIDE: This expert e-guide explores the new features of Exchange 2010 and compares this server to previous versions. Get advice to ensure a smooth transition to this platform.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

DellEMC and Intel®

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

IBM SmartCloud Email Management Express: Help protect critical email communication through advanced email management service options
sponsored by IBM
DATA SHEET: How your organization handles planned and unplanned email outages can mean the difference between business-as-usual and serious damage to your overall productivity, profitability and reputation. This data sheet describes how IBM can help you protect, archive and manage your mission-critical data and applications.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

IBM

Reducing Archiving Costs by Implementing Email Labelling Technology
sponsored by Boldon James
WHITE PAPER: This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011

All resources sponsored by Boldon James

Six Email Security Best Practices for Email SaaS
sponsored by TechTarget Security
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

TechTarget Security