IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Messaging Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Messaging Encryption White Papers (View All Report Types)
 
The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: This white paper discusses the risks of email downtime and the importance of continuity in Microsoft Office 365 environments.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

Mimecast

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Best Practices for Securing Exchange Email
sponsored by Perimeter eSecurity
WHITE PAPER: End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Perimeter eSecurity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement