IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Encrypted Email

RSS Feed    Add to Google    Add to My Yahoo!
Encrypted EmailWhite Papers (View All Report Types)
 
Keep Up With the Evolving Threat Landscape to Protect Email
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to mitigate risk associated with email within your organization and take on the challenge of the evolving threat landscape.
Posted: 20 Aug 2014 | Published: 01 Jun 2013

Cisco Systems, Inc.

The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER: Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

Trend Micro

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Best Practices for Securing Exchange Email
sponsored by Perimeter eSecurity
WHITE PAPER: End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Perimeter eSecurity

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement