• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email Client
flow-image
Proofpoint

Getting Started with DMARC

Email fraud costs companies around the world billions and can destroy brand reputation and consumer trust in minutes. The DMARC (Domain-based Message Authentication Reporting & Conformance) standard is the most powerful weapon to date in the fight against phishing and email spoofing. This Getting Started...

Published: Dec 21, 2021
View More
flow-image
Fujitsu

Employee Experience: Reimagined - The Five Questions That Will Shape Your Future Strategy

The employee experience has never been a more critical subject for business leaders. The world of work has been turned on its head, and businesses need a fresh approach to ensuring that their colleagues have the environment, tools and support they need to be at their best. The way this was delivered in the past is no longer...

Published: Feb 22, 2021
View More
flow-image
Proofpoint

User Risk Report

Behind almost every cyber attack is someone who fell victim to it. In each case, someone has clicked the wrong link, opened the wrong file or trusted the wrong email. In the 2021 Verizon Data Breach Investigations Report1, 85% of breaches involved human error. Despite constantly changing tactics, evolving malware...

Published: Dec 21, 2021
View More
flow-image
Fujitsu

The next 9 to 5: How to Make Flexible Working Work

Even before Covid-19, 9 to 5 was on its way out. In 2019, 75% of global business leaders already considered flexible working to be the new normal. This was driven by workforce globalisation and technologies that allow us to do our jobs anytime, anywhere; the need to attract and retain top talent has been another factor...

Published: Feb 22, 2021
View More
flow-image
Proofpoint

Stopping BEC and EAC

Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi‑layered defences. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources. To succeed, attackers need to find just one tactic...

Published: Apr 21, 2021
View More
flow-image
Proofpoint

Reimagining Email Security

In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...

Published: Jun 17, 2021
View More
flow-image
Microsoft

Enabling and inspiring students and teachers with Windows 8

The UK education system has seen dramatic changes in its adoption and use of ICT over the past ten years. These changes have been shaped by government curriculum and fiscal boundaries, socio-economic factors, such as the consumerisation of IT, and increasing pressure to deliver technology that not only engages pupils...

View More
flow-image
Microsoft

Clinical desktop solution transforms patient care experience at busy hospital

A key focus is improving the time spent with patients. At present doctors have to return to shared desktops in shared office space to log requests for blood tests, check patients’ records and update files. An experiment in having desktop computers wheeled around wards had proved unsuccessful. There were no portable...

View More
flow-image
Claranet

Virtual Desktops

Star’s virtual desktop provides a platform for the delivery of a working, personal desktop for different user groups, regardless of location or device. Utilising the latest technologies, the service delivers significant efficiencies and productivity gains, while reducing the burden of hardware management and security...

View More
flow-image
Proofpoint

Reimagining Email Security

In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...

Published: Dec 21, 2021
View More
flow-image
Mimecast

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control

This white paper discusses the Office 365 environment, its applicability for organizations of all sizes, and the third party capabilities that Office 365 customers should consider to supplement the platform. This document also provides a brief overview of its sponsor – McAfee – and the company’s...

View More
flow-image
LinkTek

Addressing the Growing Problem of Broken File Links During Data Migration

Broken links disrupt employees' work and lower productivity as they seek out inaccessible data.. Companies that do not address this growing problem face fustrated users, lost productivity, and lost confidence in business information.  

View More
flow-image
JAMF Software

Managing Apple Devices in a Windows Organisation

As the number of Apple devices in organizations continues to grow, IT administrators are struggling to keep pace using their existing management tools. With the Casper Suite, organizations can integrate with existing IT infrastructure to inventory, deploy, and secure their Mac computers.

View More
flow-image
Microsoft

Transportation Company Empowers Staff with Mobile Computing, Improves Service

First responder teams at Tube Lines work all day, every day, to ensure safe and timely travel on the London Underground. Tube Lines is re-architecting an iPad app to run as a touch-enabled app on Windows 8 tablets. With emergency data at their fingertips, responders work faster to protect passengers. Engineers also...

View More
  •  
  •  
  • 1
  • 2
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon