Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Email Content Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Email Content Security Appliances Reports
 
Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015

Citrix

The State of the Trust Gap: Mobile Privacy Expectations
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

The Ideal Combination of Convenience and Productivity
sponsored by Ricoh- Techdata
BROCHURE: Knowledge is indeed power, but only if you can share it quickly and securely with others in their preferred format. Learn how you can leverage a multifunction copier to enable you to distribute your important information in multiple formats without putting security at risk.
Posted: 06 Jan 2017 | Published: 30 Dec 2016

Ricoh- Techdata

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

How to Prevent Attacks from Ever Breaching You in the First Place
sponsored by Cisco and Dimension Data
WHITE PAPER: Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

Driving Data Center Growth and Innovation with Trusted Hardware Support
sponsored by IBM
WHITE PAPER: Discover a technical support service designed to help you respond effectively to changing hardware demands, from expanding product and service lines to regulatory mandates. Read on to learn about proactive support that will simplify your IT asset management, enhance service quality, and control costs.
Posted: 27 Mar 2017 | Published: 31 Dec 2016

IBM

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement