IT Management  >   Systems Operations  >   Security  >  

Internet Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Messaging Security White Papers (View All Report Types)
 
Extend the Value of IBM Lotus Applications to Increase Productivity with Avaya Unified Communications - Sponsored by Avaya and IBM
sponsored by Avaya
WHITE PAPER: Good communications are key to any company's success. The most successful enterprises strive for anywhere, anytime communications to best serve employees and clients who are increasingly mobile and geographically diverse. By unifying communications, a company can deliver communications anywhere, anytime and any way.
Posted: 25 Jun 2009 | Published: 25 Jun 2009

Avaya

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones
sponsored by Zenprise
WHITE PAPER: This white paper outlines current and future implications of consumer and enterprise mobile devices (especially when it comes to messaging), and how they can and will impact your organization. In addition, learn what you can do to prepare your business to ensure high service levels for smartphone users.
Posted: 20 Oct 2011 | Published: 20 Oct 2011

Zenprise

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution
sponsored by Perimeter eSecurity
WHITE PAPER: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations.
Posted: 20 Jan 2012 | Published: 20 Jan 2012

Perimeter eSecurity

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software

The Impact of Messaging and Web Threats
sponsored by Sunbelt Software
WHITE PAPER: Messaging, internal and Web-based threats are increasing in number and severity. Read this Osterman Research white paper to learn how organizations must implement a layered defensive strategy to protect against all types of threats and how Sunbelt Software can help.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Managing PST Files: From Discovery to the Archive
sponsored by C2C Systems
WHITE PAPER: As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 
Posted: 20 May 2010 | Published: 20 May 2010

C2C Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement