Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Decryption Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Decryption Software White Papers (View All Report Types)
 
Protecting Sensitive Emails without Impacting the User Experience
sponsored by HP Security Voltage
WHITE PAPER: Explore how to implement an end-to-end email encryption strategy that remedies the flaws of traditional systems.
Posted: 01 Apr 2015 | Published: 14 Feb 2014

HP Security Voltage

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Magic Quadrant for Master Data Management of Customer Data Solutions
sponsored by TIBCO Software Inc.
WHITE PAPER: This Magic Quadrant helps information management leaders find the right integration vendor for their needs.
Posted: 17 Mar 2015 | Published: 30 Oct 2014

TIBCO Software Inc.

Advanced Threat Protection
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

IDC MarketScape - Worldwide Business Process Platforms - 2014 Vendor Assessment
sponsored by TIBCO Software Inc.
WHITE PAPER: This IDC MarketScape focuses on business process platforms that support the design and runtime environments for comprehensive business process automation. This study serves as a guide to choosing BPM software. Read on to find out which BPM implementation is right for your organization.
Posted: 13 Mar 2015 | Published: 30 Apr 2014

TIBCO Software Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement