IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security PoliciesWhite Papers (View All Report Types)
 
Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Stopping Zombies, Botnets and Other Email-Borne Threats
sponsored by Sophos, Inc.
WHITE PAPER: Hijacked computers, or zombies, hide inside networks where they send spam, steal information, and enable serious crimes. Download this white paper and learn how the threat has evolved, how zombie networks are created and why organizations are vulnerable.
Posted: 20 Oct 2006 | Published: 01 Aug 2006

Sophos, Inc.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Outbound Email and Content Security in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover surprising statistics about how large companies manage the risks associated with outbound email. Read this report which summarizes the key findings from a survey of technology decision makers conducted by Proofpoint and Forrester Consulting.
Posted: 27 Jul 2007 | Published: 01 Jul 2008

Proofpoint, Inc.

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement