Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Decryption Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Decryption Software White Papers (View All Report Types)
 
Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

When IT Service Management isn’t What it Could Be: The Importance of Kaizen in ITSM
sponsored by Unisys
WHITE PAPER: This whitepaper focuses on how you can combine ITSM best practices with a Kaizen approach to eliminate IT inefficiencies and excess costs while modernising your overall service management framework.
Posted: 06 May 2015 | Published: 01 Oct 2014

Unisys

Five Principles for Integrating Software as a Service Applications
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper provides five tips for more efficiently integrating SaaS applications into your IT environment.
Posted: 26 Jun 2015 | Published: 24 May 2015

TIBCO Software Inc.

How to Better Guard Against a Security Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: SIEM adoption may be increasing, but only 20% of organizations use their SIEM systems to their full capacity. In this study, learn why that is – and how you can bring your SIEM use to the next level.
Posted: 11 May 2015 | Published: 11 May 2015

Hewlett-Packard Company

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement