IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Policies

RSS Feed    Add to Google    Add to My Yahoo!
Email Policies Multimedia (View All Report Types)
 
Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

The Case for Server-Based Messaging Security Solutions - Webcast
sponsored by Sunbelt Software
WEBCAST: What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution?
Posted: 08 Aug 2008 | Premiered: Aug 8, 2008

Sunbelt Software

Messaging Security for Small and Mid-sized Businesses Webcast
sponsored by Symantec Corporation
WEBCAST: Email is more and more a mission critical application. In this webcast, review risks and challenges to email and messaging management and discover a holistic best in breed solution that integrates email security, availability, backup and archiving.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Keeping Up with the Evolution of Security Operations Centers
sponsored by McAfee, Inc.
WEBCAST: Your security operations center (SOC) is the backbone of what keeps both your data and your network safe with a centralized and consolidated cybersecurity incident prevention, detection and response capabilities. In this webcast, learn the pitfalls of a weak SOC, as well as how SOC infrastructure has changed and improved in recent years.
Posted: 19 Apr 2017 | Premiered: Apr 19, 2017, 01:13 EDT (05:13 GMT)

McAfee, Inc.

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers for a NGFW technology deployment: integration with security workflow, total cost of ownership, and security effectiveness. In this NSS Labs webcast, learn market trends for NGFWs and uncover key features to consider when selecting an NGFW technology.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

6 Questions Every CIO Should Ask About Cloud Security
sponsored by IBM
WEBCAST: Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.
Posted: 10 Feb 2017 | Premiered: Feb 10, 2017

IBM

Why Secure Information Exchange is Critical for Digital Transformation
sponsored by OpenText
WEBCAST: Information and data is fueling the digital transformation. Join senior analyst from Forrester Research, Heidi Shey as she breaks down the digital transformation, uncovers 3 key requirements for success and the benefits of secure information exchange.
Posted: 20 Feb 2017 | Premiered: Feb 20, 2017

OpenText

Webcast: Moving Beyond the "Hype" in Hyperconvergence
sponsored by VeriStor
WEBCAST: Before getting swept up in hyperconverged's promises, you must look beyond the hype to determine if it's a suitable fit – and, more importantly, where and when HCI is appropriate by offering workload analysis of ROBOs, VDI, green field environments, and app development, and more.
Posted: 01 May 2017 | Premiered: May 1, 2017

VeriStor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement