Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Encryption Software White Papers (View All Report Types)
 
Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Strategic Migration Planning Guide: WebSPHERE to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: This migration planning guide provides a five-step process designed to identify migration opportunities, examine risks, create a standard enterprise environment, and develop a strategic migration plan. Read now for insight into the considerations and processes required to move to an enterprise app platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

On-Premise or in the Cloud, Java Development Can Generate Revenue
sponsored by Red Hat
WHITE PAPER: Globalization and localized business changes have increased requirements for new applications that extend the reach of enterprises into new markets and geographics. Learn methodsĀ for delivering high-impact, revenue-generating applications for today's border-defying audience.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Red Hat

Making Continuous Delivery Possible
sponsored by CA Technologies
WHITE PAPER: This white paper discusses ways teams can quickly create, edit and deploy virtual services that accurately simulate the constrained systems they need. Access now and learn how to convert complex app services into developer-friendly APIs, securely share and manage access to them, and manage the available of backend systems.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

CA Technologies

Key Considerations in choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

The Business Value of one Open Source Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: One research firm interviewed four organizations leveraging a Java-based enterprise application platform to standardize and improve their app development efforts. Discover what these companies experienced as they tested this tool.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Red Hat

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

Protecting Today's Endpoints: Rankings of Eight Endpoint Security Products
sponsored by Webroot
WHITE PAPER: This report contains the test results of eight different endpoint security systems, rating them on thirteen performance metrics so you can see which would work best for you.
Posted: 04 Sep 2015 | Published: 31 Aug 2015

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement