IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed    Add to Google    Add to My Yahoo!
E Mail SecurityWhite Papers (View All Report Types)
 
Getting the Most Out of Your Next-Generation Firewall
sponsored by Cisco
WHITE PAPER: This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Cisco

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

IBM ISS Global Data Center content analysis technology for the Web and e-mail
sponsored by IBM
WHITE PAPER: The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content.
Posted: 17 Aug 2010 | Published: 19 Nov 2008

IBM

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In today’s business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people’s personal information at risk, and no country or industry is immune.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

Is Your Acceptable Use Policy Social Media-proof?
sponsored by M86 Security
WHITE PAPER: This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

M86 Security

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement