IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Authentication and Email Security Services

RSS Feed    Add to Google    Add to My Yahoo!
Authentication and Email Security ServicesReports
 
Countdown: Top 5 technologies to help battle the new spam threat
sponsored by Trend Micro, Inc.
PODCAST: In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.
Posted: 27 Nov 2007 | Premiered: Nov 27, 2007, 09:00 EST (14:00 GMT)

Trend Micro, Inc.

Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Next-generation spam
sponsored by Trend Micro, Inc.
WEBCAST: This Podcast examines the top 5 alternative technologies enterprises can use in the battle against spam.
Posted: 27 Nov 2007 | Premiered: Nov 27, 2007, 09:00 EST (14:00 GMT)

Trend Micro, Inc.

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Learn everything you need to know about Business Tablets & their effect on the industry
sponsored by ComputerWeekly.com
RESOURCE: Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

The Case for Server-Based Messaging Security Solutions - Webcast
sponsored by Sunbelt Software
WEBCAST: What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution?
Posted: 08 Aug 2008 | Premiered: Aug 8, 2008

Sunbelt Software

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement