Business of Information Technology  >   Business Management  >   Content Management  >  

Email Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Email Content Security ManagementReports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Expert Guide to web 2.0 Threats: How to Prevent an Attack
sponsored by SearchSecurity.com
EGUIDE: A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

SearchSecurity.com

Top Cyber Intrusion Mitigation Strategies
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at today's best threat mitigation strategies, and how the addition of next-generation threat intelligence can provide rock-solid security. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Palo Alto Networks

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
sponsored by Websense, Inc.
WHITE PAPER: The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective.
Posted: 18 Aug 2009 | Published: 18 Jun 2009

Websense, Inc.

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER: ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008

Imperva

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.
Posted: 03 Apr 2008 | Published: 03 Apr 2008

Websense, Inc.

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Power efficiency and sustainable Information Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner.
Posted: 27 May 2009 | Published: 23 Dec 2008

Intel Corporation

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement