Business of Information Technology  >   Business Management  >   Content Management  >  

Email Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Email Content Security Management Reports
 
Technical guide on Web Security Gateways
sponsored by SearchSecurity.com
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

SearchSecurity.com

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 04 Mar 2013 | Published: 04 Mar 2013

ComputerWeekly.com

Cloud Adoption in Asia Pacific: Overcoming Security Concerns with SSL
sponsored by Symantec Corporation
WHITE PAPER: Cloud computing offers unprecedented opportunities for businesses to cut IT costs while improving their ability to respond to changing strategic demands. Concerns about security, however, are a barrier to adoption.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro
sponsored by Astaro
CASE STUDY: Medical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky Lab
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky Lab

LimelightSTREAM: Fast, reliable, and scalable delivery of rich media streams
sponsored by Limelight Networks, Inc.
PRODUCT LITERATURE: Check out this brief paper to learn more about LimelightSTREAM, a high performance content delivery network that enables you to make your rich media available to every user on demand.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Limelight Networks, Inc.

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
sponsored by Websense, Inc.
WHITE PAPER: The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective.
Posted: 18 Aug 2009 | Published: 18 Jun 2009

Websense, Inc.

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement