IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Authentication and Email Security Services

RSS Feed    Add to Google    Add to My Yahoo!
Authentication and Email Security Services Reports
 
Resetting Your Email Security Strategy
sponsored by Mimecast
WHITE PAPER: Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Email Security in a Zero Trust World: Modern Email Security for the IT Security Professional
sponsored by Mimecast
WHITE PAPER: Uncover critical perspectives from CISOs and security administrators regarding email threats in cloud, digital, and legacy security environments. Learn what industry professionals have to say about a solid defense-in-depth strategy for email that protects mission-critical infrastructure and data.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

Email as Part of a Business Continuity Strategy: Why always-on-business requires always-on-email
sponsored by Mimecast
WHITE PAPER: The paper looks at the general approaches available to ensure email continuity from a high level and the implications of deploying each strategy on infrastructure, budget, people and resilience.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Email Archiving Purchasing Considerations
sponsored by Iron Mountain
EGUIDE: This E-Guide will highlight the archiving options that prove to be beneficial to storage pros today, as well as the best practices to be put to use when implementing email and file archiving products.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement