IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Encryption Multimedia (View All Report Types)
 
Worry-Free Business Security Advanced
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary?
sponsored by Proofpoint, Inc.
WEBCAST: With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? And what about organizations that aren't planning to upgrade anytime soon?
Posted: 16 Feb 2010 | Premiered: Feb 16, 2010

Proofpoint, Inc.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security

3 Capabilities Found Within a Solid ITSM Strategy
sponsored by Absolute Software
VIDEO: This brief video highlights technologies that enable ITSM approaches based on practices defined within the ITIL. Tune in and learn the capabilities of a solid ITSM plan.
Posted: 08 May 2015 | Premiered: 08 May 2015

Absolute Software

Unlocking the Power of Business Analytics in Oracle Cloud
sponsored by Oracle Corporation
WEBCAST: LOB managers want cloud solutions that are contrary to core IT values and are turning to shadow BI projects to satisfy their needs. Cloud BI provides balance between LOBs and IT. Watch this webcast to learn how Oracle Analytics Cloud can create a partnership between the two.
Posted: 13 May 2015 | Premiered: May 13, 2015

Oracle Corporation

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement