IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

e-Mail Decryption

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Decryption White Papers (View All Report Types)
 
Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: This white paper discusses the risks of email downtime and the importance of continuity in Microsoft Office 365 environments.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

Mimecast

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 16 Sep 2015 | Published: 28 Feb 2014

Mimecast

Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

ESG: Realizing and Maximizing E-mail Archiving ROI
sponsored by EMC Corporation
WHITE PAPER: ESG research indicates that organizations with e-mail archive implementations experience several measurable benefits, including lower storage costs as well as more efficient compliance, electronic discovery, and data protection operations. This white paper discusses the benefits of evaluating solutions to achieve the statuses mentioned above.
Posted: 23 Apr 2009 | Published: 23 Apr 2009

EMC Corporation

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement