Business of Information Technology  >   Business Management  >   Content Management  >  

Email Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Email Content Security Management White Papers (View All Report Types)
 
Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007

IBM

Secure File Transfer in the Era of Compliance
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information.
Posted: 01 Aug 2007 | Published: 30 Jul 2007

Ipswitch WhatsUp Gold

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

Aladdin Knowledge Systems

Outbound Email and Content Security in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover surprising statistics about how large companies manage the risks associated with outbound email. Read this report which summarizes the key findings from a survey of technology decision makers conducted by Proofpoint and Forrester Consulting.
Posted: 27 Jul 2007 | Published: 01 Jul 2008

Proofpoint, Inc.

Accelerated Transactions, Increased Security a Bullseye for Dart Transit Company, Trading Partners
sponsored by EXTOL International, Inc.
WHITE PAPER: Read this brief white paper to learn how Dart Transit Company implemented an electronic data interchange strategy (EDI) that offers faster, more secure data transactions for their trading partner interactions, and more effective automation tools to manage the business integration process.
Posted: 01 Aug 2011 | Published: 01 Aug 2011

EXTOL International, Inc.

Preventing Data Leaks on USB Ports
sponsored by Pointsec Mobile Technologies
WHITE PAPER: This paper examines how to effectively prevent data leakage and protect vital company information stored on your USB devices. You will also learn how to ease your company's data movement and secure important information with USB storage techniques.
Posted: 31 Jan 2007 | Published: 01 Jan 2007

Pointsec Mobile Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement