IT Management  >   Systems Operations  >   Security  >  

Secure Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure MessagingWhite Papers (View All Report Types)
 
Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: The cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness.
Posted: 18 May 2009 | Published: 15 May 2009

Red Hat and JBoss

Email Archiving: Do More with Less – Cut Costs and Improve Productivity
sponsored by Mirapoint Software, Inc.
WHITE PAPER: Learn how Mirapoint's RazorSafe™ email archiving appliance addresses email server management, end-user productivity, business mining, e-discovery, and audit challenges in an all-in-one solution.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Mirapoint Software, Inc.

Email Management in Today's Regulatory Environment
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem..
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Best Practices in Instant Messaging Management
sponsored by Dell Software
WHITE PAPER: Instant messaging is a powerful tool, but is your organization protected from malware/viruses, reduced productivity and accidental transfer of sensitive documents? Read this paper to learn how to mitigate these risks.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

Dell Software

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

A Guide to Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement