IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security Policies White Papers (View All Report Types)
 
How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Impactful Email Marketing: Using Behavioral Analytics to Create Relevant Messages
sponsored by Bronto Software
WHITE PAPER: A successful strategy for taking your email marketing/web analytics integration beyond traffic analysis is to use web analytics for gauging effectiveness of email marketing initiatives and determining optimization tactics.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

Bronto Software

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006

SonicWALL

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches
sponsored by Boldon James
WHITE PAPER: In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Mobile Security: Email is Your Biggest Risk
sponsored by TITUS
WHITE PAPER: In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.
Posted: 02 May 2013 | Published: 31 Dec 2012

TITUS

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement