Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

Email Decryption Software

RSS Feed    Add to Google    Add to My Yahoo!
Email Decryption SoftwareWhite Papers (View All Report Types)
 
Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

Fast Track Open Source Virtualization
sponsored by HP and Intel
WHITE PAPER: Access this exclusive resource to find out how the combination of HP's converged infrastructure and Red Hat's virtualization software create the perfect platform for consolidating your Linux systems.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

HP and Intel

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

The Benefits of HP Operations Orchestration Software
sponsored by Hewlett-Packard Company
WHITE PAPER: Take a look at this concise resource to find out how HP Operations Orchestration software can help your organization reduce errors, save money, accelerate ROI and more.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

HR in the Cloud
sponsored by Workday
WHITE PAPER: This whitepaper examines theĀ five big trends that are pushing adoption, examining each trend in-depth and explaining exactly why it is driving a need for SaaS.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Workday

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: These performance results show testing of 8 compteting security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement