Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

Email Decryption Software

RSS Feed    Add to Google    Add to My Yahoo!
Email Decryption Software White Papers (View All Report Types)
 
The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Protect and Distribute BYOD documents
sponsored by IBM
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

An Executive Guide to IBM’s Strategy and Roadmap for its Integrated Operating Environment for Power Systems
sponsored by TechData Corporation
WHITE PAPER: As the integrated operating environment for IBM Power Systems server, IBM i is used by companies of all sizes in all regions of the world. Explore this white paper to understand IBM's strategy and roadmap for the IBM i operating system.
Posted: 24 May 2016 | Published: 29 Apr 2016

TechData Corporation

Architectural Choices for the HANA-Bound SAP Customer
sponsored by IBM
WHITE PAPER: This white paper takes an in-depth look at the architectural choices available to SAP customers who have decided to move to HANA. Learn now about the evolution toward HANA, its next stage, and the advantages behind certain partnerships.
Posted: 06 Apr 2016 | Published: 28 Aug 2015

IBM

A Smart Way to Protect Windows Server 2003
sponsored by Unisys
WHITE PAPER: Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.
Posted: 13 Jun 2016 | Published: 30 Jun 2014

Unisys

Shifting Your Digital Transformation Into the Fast Lane: Five Keys to Higher-quality Application Delivery
sponsored by CA Technologies.
WHITE PAPER: Shifting application development into the fast lane of continuous delivery is possible, but requires businesses to adopt a new test model. In the following guide, explore five keys that can help your organization achieve continuous delivery.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement