Business of Information Technology  >   Business Management  >   Content Management  >  

Email Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Email Content Security ManagementWhite Papers (View All Report Types)
 
EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: Read this whitepaper to find out three ways to balance IT needs with user demands.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Hotspot 2.0: Making Wi-Fi as Easy to Use and Secure as Cellular
sponsored by Ruckus Wireless
WHITE PAPER: Today's cellular networks are being overwhelmed with data traffic, much of it being generated by the rapid proliferation of smartphones. The latest projections are for the industry to ship over 800 million such devices in 2013.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Ruckus Wireless

Ensuring Compliance in the Asia Pacific Region with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Doing business in Australia, New Zealand, Singapore, or other parts of the Asia Pacific region means one key concern – privacy. This informative resource considers threats to privacy, essential encryption, and SSL certificate best practices.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Symantec Corporation

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
sponsored by Websense, Inc.
WHITE PAPER: The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective.
Posted: 18 Aug 2009 | Published: 18 Jun 2009

Websense, Inc.

Security through Maturity: A Brief on Securing iSCSI Networks
sponsored by Dell, Inc.
WHITE PAPER: Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
Posted: 13 May 2009 | Published: 13 May 2009

Dell, Inc.

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Sophos, Inc.

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement