IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure Email White Papers (View All Report Types)
Holistic Protection against Today's Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses how implementing a holistic threat protection technology can help you protect more of your network while spending less.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Speed, Scale, Security: Orchestrating a Great Download Experience
sponsored by Limelight Networks, Inc.
WHITE PAPER: This white paper describes which systems, infrastructures, and processes can make your software available faster despite latency challenges. Learn how to optimize quick and efficient delivery of your files.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Limelight Networks, Inc.

Sandbox and Secure Email Gateway - Security Dynamic Duo
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, you'll discover how SEGs are evolving to deliver additional layers of protection against hackers and how sandboxing, when used concurrently, can inspect harmful emails that reside within the grey area between white and black lists. View now to learn how to prevent APTs from reaching your end users.
Posted: 05 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Securing Microsoft Exchange 2010 with VeriSign Authentication Services
sponsored by VeriSign EMEA
WHITE PAPER: This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 26 Oct 2011 | Published: 26 Oct 2011

VeriSign EMEA

Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Is Your Acceptable Use Policy Social Media-proof?
sponsored by M86 Security
WHITE PAPER: This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

M86 Security

Escalating Targeted Web and Email Attacks
sponsored by M86 Security UK
WHITE PAPER: Today's cybercriminals are more dangerous and sophisticated than ever before, launching more targeted attacks for bigger payoffs. And with new emerging technologies, also come new ways of exploitation. In this resource, explore the growing issue of targeted web and email threats and discover a unique approach to mitigating them.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

M86 Security UK

Beyond Spam - Email Security in the Age of Blended Threats
sponsored by EdgeWave
WHITE PAPER: In this paper, explore the new threat reality, including the tactics and designs cyber criminals are using today and uncover some of the next generation technologies that can help mitigate these threats.
Posted: 12 Mar 2012 | Published: 12 Mar 2012


Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

Post-Migration Best Practices: Exchange Environment Operation
sponsored by Dell Software
WHITE PAPER: In this Quest white paper, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post-migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration management you must know.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Dell Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement