IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

e-Mail Decryption

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Decryption White Papers (View All Report Types)
 
The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: This white paper focuses on the importance of continuity for the cloud-based email platform, Microsoft Office 365, and provides 4 steps to determining your need for high availability.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

Mimecast

Protecting Sensitive Emails without Impacting the User Experience
sponsored by HP Security Voltage
WHITE PAPER: Explore how to implement an end-to-end email encryption strategy that remedies the flaws of traditional systems.
Posted: 01 Apr 2015 | Published: 14 Feb 2014

HP Security Voltage

6 Requirements for Enterprise Key Management
sponsored by HP Security Voltage
WHITE PAPER: This white paper walks you through the six requirements for a robust key management system. Explore why traditional key management architectures have fallen short and how to fill the gaps in your strategy.
Posted: 02 Apr 2015 | Published: 27 Oct 2014

HP Security Voltage

Ensuring End-to-End Data Protection
sponsored by HP Security Voltage
WHITE PAPER: In this white paper, explore how encryption, tokenization, and data masking provide a comprehensive approach to data protection.
Posted: 01 Apr 2015 | Published: 14 Apr 2013

HP Security Voltage

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Best Practices for Securing Exchange Email
sponsored by Perimeter eSecurity
WHITE PAPER: End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Perimeter eSecurity

The Critical Need for Encrypted Email and Secure File Transfer Solutions
sponsored by Proofpoint, Inc.
WHITE PAPER: This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Posted: 04 Aug 2009 | Published: 01 Jul 2009

Proofpoint, Inc.

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement