IT Management  >   Systems Operations  >   Security  >  

Enterprise Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Messaging Security White Papers (View All Report Types)
 
Move from Chaos to Control:  Creating a Mature File Transfer Process
sponsored by IBM
WHITE PAPER: When it comes to moving files between people, business, and other processes a majority of organizations are struggling. This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

A Guide to Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

Optimizing Exchange High Availability - A New Approach
sponsored by Marathon Technologies
WHITE PAPER: Businesses of all sizes are using the messaging and collaboration features of Microsoft Exchange to run critical business functions that if lost, can result in severe business disruption. Exchange and Exchange infrastructure components are analyzed in this paper to determine how they can be protected so you can achieve your SLA commitments.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

Marathon Technologies

Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: The cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness.
Posted: 18 May 2009 | Published: 15 May 2009

Red Hat and JBoss

Fundamental Principles of Network Security
sponsored by Schneider Electric
WHITE PAPER: This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Posted: 10 Jul 2009 | Published: 09 Jul 2009

Schneider Electric

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement