IT Management  >   Systems Operations  >   Security  >  

Electronic Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Messaging Security Reports
 
IT Decision Checklist: Messaging Security
sponsored by SearchSecurity.com
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

SearchSecurity.com

Exchange Insider E-zine -- Volume 7: Five Things to Do Before Virtualizing Exchange Server 2010
sponsored by SearchExchange.com
EZINE: This issue demonstrates how to change default Outlook Web App settings and why you shouldn’t skip the tedious process of documenting a server migration project. Also learn the five critical elements you'll need to have in place before you plug in your first virtual machine.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

SearchExchange.com

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER: This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008

Trend Micro, Inc.

Beaufort Memorial Case Study
sponsored by Imprivata
WHITE PAPER: This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

The Essential Guide to Protecting Essential Information
sponsored by Websense, Inc.
PRODUCT LITERATURE: Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement