IT Management  >   Systems Operations  >   Security  >  

Electronic Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Messaging SecurityWhite Papers (View All Report Types)
 
Why You Should Consider Hosted Messaging Security
sponsored by Trend Micro GmbH
WHITE PAPER: In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.
Posted: 25 Sep 2009 | Published: 19 Feb 2009

Trend Micro GmbH

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution
sponsored by Perimeter eSecurity
WHITE PAPER: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations.
Posted: 20 Jan 2012 | Published: 20 Jan 2012

Perimeter eSecurity

Best Practices in Instant Messaging Management
sponsored by Dell Software
WHITE PAPER: Instant messaging is a powerful tool, but is your organization protected from malware/viruses, reduced productivity and accidental transfer of sensitive documents? Read this paper to learn how to mitigate these risks.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

Dell Software

Fundamental Principles of Network Security
sponsored by APC by Schneider Electric
WHITE PAPER: This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Posted: 10 Jul 2009 | Published: 09 Jul 2009

APC by Schneider Electric

A Guide to Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009
sponsored by Proofpoint, Inc.
WHITE PAPER: The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection.
Posted: 12 Aug 2009 | Published: 11 Aug 2009

Proofpoint, Inc.

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Extend the Value of IBM Lotus Applications to Increase Productivity with Avaya Unified Communications - Sponsored by Avaya and IBM
sponsored by Avaya
WHITE PAPER: Good communications are key to any company's success. The most successful enterprises strive for anywhere, anytime communications to best serve employees and clients who are increasingly mobile and geographically diverse. By unifying communications, a company can deliver communications anywhere, anytime and any way.
Posted: 25 Jun 2009 | Published: 25 Jun 2009

Avaya

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a midā€sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement