IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security Policies White Papers (View All Report Types)
 
Email Security in a Zero Trust World
sponsored by Mimecast North America
WHITE PAPER: Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

5 Essentials for Cloud Archiving Success
sponsored by Mimecast North America
WHITE PAPER: Discover 5 essentials for email cloud archiving to keep your enterprise's data safe, available for easy access and sharing across the organization.
Posted: 30 Dec 2016 | Published: 30 Dec 2016

Mimecast North America

The Top Email Data Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This webinar examines common risks you may come across with Office 365. View now to explore the state of email threats, and how to augment your Office 365 deployment with proper protection strategies.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches
sponsored by Boldon James
WHITE PAPER: In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Stopping Zombies, Botnets and Other Email-Borne Threats
sponsored by Sophos, Inc.
WHITE PAPER: Hijacked computers, or zombies, hide inside networks where they send spam, steal information, and enable serious crimes. Download this white paper and learn how the threat has evolved, how zombie networks are created and why organizations are vulnerable.
Posted: 20 Oct 2006 | Published: 01 Aug 2006

Sophos, Inc.

Information Governance Perspectives from RSD: E-mail Archiving
sponsored by RSD
WHITE PAPER: With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions
Posted: 17 Aug 2009 | Published: 17 Aug 2009

RSD

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement