IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Policies Multimedia (View All Report Types)
 
Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

The Case for Server-Based Messaging Security Solutions - Webcast
sponsored by Sunbelt Software
WEBCAST: What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution?
Posted: 08 Aug 2008 | Premiered: Aug 8, 2008

Sunbelt Software

Messaging Security for Small and Mid-sized Businesses Webcast
sponsored by Symantec Corporation
WEBCAST: Email is more and more a mission critical application. In this webcast, review risks and challenges to email and messaging management and discover a holistic best in breed solution that integrates email security, availability, backup and archiving.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Sophos Email Security Appliances
sponsored by Sophos
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Chrome OS: Secure from Bootup to Shutdown
sponsored by Google Cloud
VIDEO: As businesses create more data, it's becoming more important than ever to protect it. Watch this on-demand Google webinar to understand how Chrome OS is uniquely designed with best-in-class security at the both the hardware and software levels.
Posted: 21 Nov 2017 | Premiered: 21 Nov 2017

TOPICS:  IT Management
Google Cloud

Is Your IT Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
VIDEO: In this video, Principal Analyst at Forrester Research David K. Johnson demonstrates how to achieve the often-conflicting goals of promoting employee flexibility alongside delivering greater device security. Tune in to overcome the risks BYOD programs, device malware, and more pose to your device landscape.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Dell and Microsoft

Your Business Apps are Under Attack: Are you really Protected?
sponsored by Alert Logic
VIDEO: Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Alert Logic

GFI MailArchiver 5 for Exchange
sponsored by GFI Software
TRIAL SOFTWARE: GFI is a leading supplier of security and messaging tools for network administrators. GFI empowers the network administrator to purchase security and messaging solutions with superior technology at unbeatable prices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

TOPICS:  Email Archiving
GFI Software

Electronic Document Retention and Destruction: The impact of global regulations
sponsored by CA Technologies.
WEBCAST: Multiple countries, numerous regulations and a variety of legal requirements complicate the creation of electronic records retention policies for global organizations.
Posted: 10 May 2007 | Premiered: May 17, 2007, 09:00 EDT (13:00 GMT)

CA Technologies.

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 21 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

Virtualizing IBM Lotus Domino 8.5.1 on VMware vSphere 4 – Testing Performance, Functionality and Benefits
sponsored by VMware, Inc.
WEBCAST: In this webinar, Jim Powers from IBM and David Korsunsky from VMware will introduce the results of the latest testing done to validate performance and functionality for running IBM Lotus Domino™ 8.5.1 running on virtual machines using VMware vSphere™ 4.0. 
Posted: 05 May 2011 | Premiered: May 5, 2011

VMware, Inc.

Cisco Prime Collaboration Manager (CM) 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Uncover the details of Cisco Prime Collaboration Manager to learn how you can gain deeper network visibility, all the way down to the granularity of video flow statistics, to ensure an optimal end-user experience for your users.
Posted: 02 Jul 2012 | Premiered: 04 Nov 2011

Cisco Systems, Inc.

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010

ManageEngine

In-Memory Analytics: Solutions for the Modern World
sponsored by MicroStrategy Incorporated
WEBCAST: Tune into the following webcast to get a firsthand look at how in-memory analytics are opening up new pathways to faster insights and better business performance. Learn what differentiates in-memory analytics from past business intelligence models.
Posted: 26 Jun 2014 | Premiered: Jun 26, 2014

MicroStrategy Incorporated

Enhancing End-to-End Cloud Security: Part 3
sponsored by Intel Security
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

Intel Security

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

CA ARCserve Replication r15 and CA ARCserve High Availability r15 Evaluation Software
sponsored by arcserve
SOFTWARE DOWNLOAD: CA ARCserve® Replication offers continuous data protection to complement any backup solution. This software trial includes all Replication and High Availability features for your convenience and testing. Download now.
Posted: 28 Jun 2010 | Premiered: 28 Jun 2010

arcserve

Windows Server 2008 R2: Top 10 Changes You'll Actually Care About
sponsored by DellEMC and Intel®
WEBCAST: Watch this webcast to learn about the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.
Posted: 05 Feb 2010 | Premiered: Feb 5, 2010

DellEMC and Intel®

Improve Your Automated Decisions with Business Rules & Events
sponsored by IBM
VIDEO: Watch this 5-minute video to understand how business rules and business events processing can be used to create intelligent decision automation solutions across a variety of industries and applications. Featured industry scenarios: Healthcare, Retail and Financial Services.
Posted: 10 Oct 2011 | Premiered: 07 Oct 2011

IBM

Insurance 2020: Innovating beyond Old Models
sponsored by IBM Line of Business
PODCAST: Podcast discusses the strategic challenges insurance companies will face in the insurance marketplace of the future and shares ideas for moving from today's realities to tomorrow's potential.
Posted: 12 Jun 2008 | Premiered: Jun 12, 2008

IBM Line of Business

Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos

What’s New with IBM Cognos Business Intelligence V10.1
sponsored by IBM
PRODUCT DEMO: See what's new in IBM Cognos Business Intelligence V10.1 that makes it possible to connect everyone in your organization with the insight, analytics and information they need to make better, faster, smarter decisions.
Posted: 07 Feb 2011 | Premiered: 07 Feb 2011

IBM

Content Analytics Dialoginar
sponsored by IBM
WEBCAST: Learn about identifying hidden trends, creating cost savings, and differentiating yourself from your competitors.
Posted: 23 May 2011 | Premiered: May 23, 2011

IBM

Video: The All New 2010 Intel Core Processor Family for Business PCs-- Deploy with Confidence
sponsored by Intel
VIDEO: Watch this brief video to learn how the 2010 Intel Core Processor family prepares your business for today's needs and for tomorrow.
Posted: 27 Sep 2010 | Premiered: 27 Sep 2010

Intel

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement