E-mail and E-mail Management

E-mail is the most common form of communication in companies, and all that information must be managed as both a vital asset and potential security risk. Spam filtering and antivirus e-mail management solutions are a must. Many companies also use filters to ensure that offensive e-mails are not sent internally and that vital company data is not sent outside the company. Many companies employ enterprise content-management (ECM) solutions to categorize the content of e-mails; storage of the all those messages also is a key concern.


Articles

Cisco CEO: Internet of Everything Will Be Worth $19 Trillion

At CES, John Chambers said the Internet of everything will be more about its impact on people's lives than the underlying technology. More >

Telecom Players Look to Save Massive Amounts of Energy

Attempting to cut operational expenditures, protect against looming energy scarcity, please subscribers and protect the environment. More >

Small Telcos’ Disconnect with the Connect America Fund

What is not as newsworthy is that many of the advances in telecommunications infrastructure are made – and always have been made – by smaller telephone companies, many of which are rural areas. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Five Critical Tenets of Identity and Access Management

Security Staffing

The identity and access management (IAM) market is experiencing a renaissance with the emergence of new options for how and where to deploy IAM technology, both on-premises and as a service.

 More >

Splunk Adds Risk Scoring Framework to SIEM Platform

How Silos in the Marketing Organization Thwart Alignment with IT

Microservers Targeting Specific Enterprise Workloads

Data Breaches: On the Rise and Chasing Away Customers

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.