Email Resources

Email news and support resources, featuring the hottest solutions, technologies and vendors in the Email world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Email"

User Education for Cybersecurity: Yes, It’s Worth It

Ivanti
Many successful ransomware/other malware attacks share two characteristics. One is that they gain access to an enterprise network because a legitimate, authorized user does something they shouldn’t. Such as opening a phishing email, clicking on a bogus web link, or falling victim to credential theft. The other is that they initiate or revive a spirited […]

Citrix: The Usual Suspects – The Security Pitfalls of Data At Large

Citrix Systems
Data is the crown jewel of an organization – its high value must be protected at all costs. Data fuels the modern-day economy; the work of the present and the work of the future demand that we share it more than ever before. But while data mobility is reaching new horizons, many of the controls […]

VMware vExpert NSX 2017 Award Winners

VMware
Thank you to everyone who applied for vExpert NSX. I’m pleased to announce the list of 2017 vExperts who received the NSX award. Each of these vExperts have demonstrated significant contributions to the community and a willingness to share their expertise with others. Contributing is not always blogging or Twitter as there are many public […]

VMware vExpert 2017 Second Half Award Winners!

VMware
Thank you to everyone who applied for vExpert. I’m pleased to announce the list of 2017 Second Half vExperts. Each of these vExperts have demonstrated significant contributions to the community and a willingness to share their expertise with others. Contributing is not always blogging or Twitter as there are many public speakers, book authors, script […]

Cisco: Where in the World Is Your Email Security?

Cisco
Email continues to be both the number one way business people across the globe communicate, as well as the number one threat vector that can endanger the very thing it is trying to enable, getting business done.  However, our global economy means now, more than ever, senders and receivers of email can be anywhere in […]

Citrix: New Swipe Features in SecureMail

Citrix Systems
Citrix has recently provided  much sought-after enhancement in the swipe actions on the individual emails. . Now let’s look at the workflows for these actions on swipe: Swipe left on any email from right and you get to see the options:  More , Flag &. Delete as shown in the picture below: You can either single tap on the delete option when […]

VMware alarms management made simple with Veeam ONE

Veeam
Monitoring data center performance is an essential part of every IT administrator’s job that shouldn’t be overlooked. There are many avenues you can go down when looking at a tool to help monitor performance, but with Veeam, you can do this with Veeam ONE. Veeam ONE has many capabilities, but one of the most important […]

Cisco: Deep Dive into AMP and Threat Grid integration with Cisco Email Security

Cisco
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect customers from the number one threat […]

Citrix: Kiss Unwanted Emails Goodbye with XenMobile 10.6.15 Swiping Gestures

Citrix Systems
XenMobile client release 10.6.15 is now available. XenMobile 10.6.15 is a public app store release which includes updated versions of Secure Hub, Secure Mail and Secure Web. I’ve been with Citrix for more than 3 ½ years (and yes, I still love it; it’s a great place to work). But there’s a downside that comes with workplace […]

Microsoft Azure AD authentication extensions for Azure SQL DB and SQL DW tools

Microsoft
With the latest SQL server tools release we extended the Azure AD authentication support for SQL DB and DW tools for token-based authentication (Universal authentication) with MFA support. The following SQL Server tools have been extended adding new functionality: SSMS 17.2 supports the following functionalities: Multiple-user Azure AD authentication for Universal authentication with multi-factor support […]

Citrix ShareFile & G Suite: Enterprise Content Sharing and Collaboration

Citrix Systems
Google and Citrix recently announced an expanded collaboration that spans multiple products and services from both companies to support customers with their secure cloud transformation. One key area that I would like to discuss in more detail is the ongoing product collaboration to enable G Suite integration with ShareFile. G Suite is a set of […]

Microsoft: An update to Azure AD Conditional Access for Office.com

Microsoft
Today I’m writing to provide some background about a change in how conditional access policies will soon be enforced when users access Office.com. Notifications about this change have been sent out, but several of you have asked for additional details. What’s changed? On August 24th, a change will roll out that requires users to satisfy […]

Citrix: Securing Collaboration for G Suite Customers

Citrix Systems
Google and Citrix have announced a partnership to support customers with their secure cloud transformation, which spans multiple products and services from both companies. One key area of that partnership that I’d like to discuss in more detail is the G Suite integration. G Suite is a set of intelligent business apps that connect the people in […]

The only thing converged in “converged infrastructure” is the purchase order

Steve Kaplan
I was at a CIO roundtable in Portland a couple of weeks ago and during the introductions, one of the CIOs said, “We’ve been using hyperconverged for the past five years on a Vblock.” My tongue still hurts from biting it. Could anything possibly be more unlike software-defined hyperconverged infrastructure (HCI) than a Vblock?  As […]

Visit our Sponsors!

Close