IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure Email White Papers (View All Report Types)
 
Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: Discover how you can accurately collect and examine threat intelligence to prevent phishing schemes from infecting your network. Gain knowledge and insight into malicious actors so you can prevent future, possibly business-crippling, attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Augmenting security and management of Office 365 with Citrix XenMobile
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to securely deploy and manage Office 365, protect data at rest on mobile devices and protect data in transit. You'll also learn how to configure mobile apps with hosted Exchange and more.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Citrix

Sophos Phish Threat
sponsored by Sophos
WHITE PAPER: Look at this white paper to learn how to automate defense education for your users with routine campaigns, training, follow-up and reporting.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Sophos

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement