IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed    Add to Google    Add to My Yahoo!
E Mail SecurityReports
 
Citrix Secure Email Deployment Guide
sponsored by Citrix
WHITE PAPER: This informative paper examines a solution that unlocks the power of mobile devices to participate in business information exchange, allowing you to safely and securely access and hold confidential information without having to worry about leaks or theft.
Posted: 22 Aug 2013 | Published: 22 Aug 2013

Citrix

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do!
sponsored by Global Knowledge
WHITE PAPER: Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Wake Up From Your Mobile Nightmare
sponsored by Citrix
EBOOK: This informative and entertaining guide takes a look at a mobile email solution from industry leader Citrix that provides the scale, functionality and management control IT requires without holding users back from their mobile devices, applications or productivity.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

Citrix

Secure Web Gateways Decision Center
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 29 Oct 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Getting the Most Out of Your Next-Generation Firewall
sponsored by Cisco
WHITE PAPER: This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Cisco

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by Good Technology
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

Good Technology

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by Symantec Corporation
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Symantec Corporation

Securing Microsoft Exchange 2010 with VeriSign Authentication Services
sponsored by VeriSign EMEA
WHITE PAPER: This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 26 Oct 2011 | Published: 26 Oct 2011

VeriSign EMEA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement