Standards  >   Messaging Protocols  >  

Internet Mail Extensions

RSS Feed    Add to Google    Add to My Yahoo!
Internet Mail Extensions Multimedia (View All Report Types)
Changes in Financial Management Systems and Regulations
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014


IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010


Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010


Extreme Transaction Processing: Electronic trading at NYMEX
sponsored by Progress
WEBCAST: This Webcast explores a method for increasing the capacity of messaging infrastructure in order to support greater message throughput and future organizational growth.
Posted: 28 Sep 2007 | Premiered: Sep 28, 2007


Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015


Make Your Cloud Email Migration a Smooth Transition
sponsored by Mimecast
WEBCAST: Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.
Posted: 26 Oct 2015 | Premiered: Feb 25, 2015


Ensuring Your Email Strategy Measures Up
sponsored by ControlEmail
WEBCAST: This brief webcast examines how to mitigate the top email threats of today including phishing, malware, spam, and more. View now to learn how to ensure email continuity even when your server is down and the strategies to secure sensitive data.
Posted: 01 Sep 2015 | Premiered: Aug 21, 2015


Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


How Bad Can Adversaries Get?: Examining the Hacker's Evolution Over Time
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected, as well as the top 10 attacks they're using. Learn how a risk-based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack on an Adobe Flash Player vulnerability, and how APT3, the cybercrime group conducting it, achieved success in breaking through security.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012


Today's Top 10 Web Hacking Technique
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network as we continue through 2015. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Breaking the Kill Chain of Advanced Attacks
sponsored by Fortinet, Inc.
WEBCAST: This brief webcast explores how to augment and enhance the performance of the kill chain with a 3-pronged network security approach. View now to learn how to expose hidden and unknown threats to avoid becoming the next breach victim
Posted: 05 Jun 2015 | Premiered: Dec 31, 2014

Fortinet, Inc.

Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015


Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013


Next Generation Threat Defense: Malware Breaks Past Perimeters
sponsored by Trend Micro
WEBCAST: In this thrilling webcast, watch the drama unfold as one organization relies too heavily on fossil network security measures and falls victim to a data breach despite taking all of the necessary remediation steps such as log audits and sandboxing. View now to learn the strategies to bolster network security and how to rethink your architecture.
Posted: 01 Oct 2015 | Premiered: Sep 2, 2015

Trend Micro

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

The Social Enterprise: Tips for Helping Enterprises Collaborate Securely
sponsored by IBM
VIDEO: Join Caleb Barlow, Director of Data and Mobile Security at IBM, as he reveals from a security perspective, what users need to do to protect your own person and business against malicious phishing attacks. Also learn about the strategies and policies you can put in place to secure your business and social devices.
Posted: 14 Mar 2014 | Premiered: 14 Mar 2014


Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure
sponsored by Centrify Corporation
WEBCAST: Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.
Posted: 05 Nov 2015 | Premiered: Apr 2, 2015

Centrify Corporation

The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. View now to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger, CEO of Starmobile, joins Brian Madden to hash out app refactoring. They discuss how to extend application virtualization, and capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015


Trusted Computing in a Hybrid Cloud Environment
sponsored by Intel and IBM
WEBCAST: In this extensive webcast, learn the 4 challenging questions consumers ask when considering a cloud migration, and how to lay their fears to rest that their data will remain safe. View now to learn how to remain compliant with data privacy laws when data is moved to the cloud.
Posted: 05 Oct 2015 | Premiered: Jun 11, 2015

Intel and IBM

Red Hat CloudForms Demo Automatic Provisioning
sponsored by Red Hat
VIDEO: This video covers a scalable, open and extensible platform that will help you simplify the provisioning of virtual machines.
Posted: 07 Apr 2014 | Premiered: 07 Apr 2014

Red Hat

GFI MailArchiver 5 for Exchange
sponsored by GFI Software
TRIAL SOFTWARE: GFI is a leading supplier of security and messaging tools for network administrators. GFI empowers the network administrator to purchase security and messaging solutions with superior technology at unbeatable prices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

TOPICS:  Email Archiving
GFI Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement