IT Management  >   Systems Operations  >   Security  >   Messaging Security  >   Email Security  >  

e-Mail Filtering

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail FilteringWhite Papers (View All Report Types)
 
Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Best Practices for Securing Exchange Email
sponsored by Perimeter eSecurity
WHITE PAPER: End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Perimeter eSecurity

Beyond Spam - Email Security in the Age of Blended Threats
sponsored by EdgeWave
WHITE PAPER: In this paper, explore the new threat reality, including the tactics and designs cyber criminals are using today and uncover some of the next generation technologies that can help mitigate these threats.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

EdgeWave

Spam, Spammers, and Spam Control
sponsored by Trend Micro GmbH
WHITE PAPER: This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Posted: 25 Sep 2009 | Published: 06 Mar 2009

Trend Micro GmbH

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Business Value Analysis Study: Citizens Business Bank
sponsored by Symantec Corporation
WHITE PAPER: As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Network Testing Labs Review: Make Internet Risks and Perils Disappear
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.
Posted: 23 Nov 2009 | Published: 30 Jun 2009

McAfee, Inc.

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement