Business of Information Technology  >   Business Management  >   Content Management  >  

e-Mail Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Content Security Management White Papers (View All Report Types)
Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Build an End-to-End Frame for Your Enterprise Mobility Security
sponsored by Good Technology
WHITE PAPER: In this report, you will learn how to deliver holistic mobile security architecture to your organization that will preserve end user privacy, and extend this protection to new devices and OS's.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Good Technology

The State of Mobile Application Insecurity: Reducing the Risk of Unsecure Apps
sponsored by IBM
WHITE PAPER: In this case study, you will learn how to successfully reduce the risk of unsecured mobile apps in your business, and see what steps enterprises are taking to secure these apps.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015


Solutions for Healthcare and HIPAA Compliance
sponsored by Citrix
WHITE PAPER: This guide reviews how new mobile technologies can help improve care using modern applications.
Posted: 11 Nov 2015 | Published: 31 Dec 2014


Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008


Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Sophos, Inc.

The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012


TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012


Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement