IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Anti-phishing Services

RSS Feed    Add to Google    Add to My Yahoo!
Anti-phishing ServicesReports
 
10 Tips for Securing your Email
sponsored by Symantec Hosted Services
WEBCAST: Attend this SearchSMB.com Expert Webcast to learn 10 tips that will help small to medium-sized businesses (SMBs) protect their corporate email servers.
Posted: 30 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)

Symantec Hosted Services

City of Manassas Takes Control of Personal Storage Files
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how one city government took control of its personal storage files.
Posted: 07 Jul 2014 | Published: 02 Jul 2013

C2C Systems

Mitigating Email Virus Attacks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

Email Security in the Cloud: More Secure! Compliant! Less Expensive!
sponsored by McAfee, Inc.
ANALYST BRIEF: Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.
Posted: 08 Aug 2011 | Published: 01 Apr 2010

McAfee, Inc.

Email Archiving Purchasing Considerations
sponsored by Iron Mountain
EGUIDE: This E-Guide will highlight the archiving options that prove to be beneficial to storage pros today, as well as the best practices to be put to use when implementing email and file archiving products.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Iron Mountain

The Case for Server-Based Messaging Security Solutions - Webcast
sponsored by Sunbelt Software
WEBCAST: What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution?
Posted: 08 Aug 2008 | Premiered: Aug 8, 2008

Sunbelt Software

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement