Business of Information Technology  >   Business Management  >   Content Management  >  

Email Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Email Content Security Management Reports
How to Provide Secure Application Access and Improve Network Performance
sponsored by Palo Alto Networks
CASE STUDY: In this case study, learn how the University of Adelaide transformed their non-scalable network security system by deploying next-generation firewall technology, offering granular visibility of threats and better control of Internet applications.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Healthcare's Now in the Cloud with MDM
sponsored by IBM
WHITE PAPER: This white paper outlines the risks associated with incorporating MDM in hospital environments, and examines an MDM solution specific unto healthcare organizations.
Posted: 11 Aug 2015 | Published: 11 Aug 2015


Technical guide on Web Security Gateways
sponsored by
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Power efficiency and sustainable Information Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to hear how the authors tackle the ever-increasing problem of the cost of energy consumption in an enterprise. They show how the use of remote power-management technologies allows a business to manage energy consumption while ensuring that systems can be awakened in a reliable, secure manner.
Posted: 27 May 2009 | Published: 23 Dec 2008

Intel Corporation

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos, Inc.

Security through Maturity: A Brief on Securing iSCSI Networks
sponsored by Dell, Inc.
WHITE PAPER: Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
Posted: 13 May 2009 | Published: 13 May 2009

Dell, Inc.

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING: The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement