IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Email Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Encryption, Messaging Encryption, Encryption, Email Decryption, e-Mail Decryption, Mail Encryption, Encrypted Email, Message Encryption
DEFINITION: The scrambling of an email message that prevents people other than the intended recipient from reading it.
Email Encryption Reports
1 - 25 of 41 Matches Previous Page  |  Next Page
Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks
sponsored by Cloudmark
RESOURCE: Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.
Posted: 18 Jan 2016 | Published: 06 Jan 2016

Cloudmark

Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST: Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015

Proofpoint, Inc.

Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Email is Today's #1 Advanced Threat Vector – Here's Why
sponsored by Proofpoint, Inc.
RESOURCE: Check out this brief infographic to learn what files hackers are using to dupe employees into clicking malicious links. Uncover the succes - or unsuccessful - level of protection antivirus provides against targeted threats.
Posted: 20 Oct 2015 | Published: 14 Oct 2015

Proofpoint, Inc.

Case Study: Mitigate Email APTs in the Cloud
sponsored by Proofpoint, Inc.
CASE STUDY: Learn how H-E-B, a San Antonio based supermarket chain, eliminated false positive message classification and improved email security against APTs in the cloud.
Posted: 15 Oct 2015 | Published: 23 Sep 2015

Proofpoint, Inc.

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 16 Sep 2015 | Published: 28 Feb 2014

Mimecast

Post-Migration Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This white paper presents the 3 common expectations organizations have when moving to Office 365 and demystifies the hype around each. View now to learn the steps to take to ensure data security in the cloud-based email service.
Posted: 15 Sep 2015 | Published: 29 Jul 2015

Mimecast

Mimecast Broad Spectrum Email Security for Office 365
sponsored by Mimecast
WHITE PAPER: In this white paper, you'll learn the limitations of Office 365 security and what you can do to protect your users and your email.
Posted: 11 Sep 2015 | Published: 05 Aug 2015

Mimecast

Email Security Guide: 7 Critical Capabilities of Email Gateways
sponsored by LogicNow
WHITE PAPER: This white paper presents the 7 critical capabilities of email gateways to mitigate the top 5 email attacks.
Posted: 27 Aug 2015 | Published: 22 Jul 2015

LogicNow

How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

Enterprise Email Security: Introduction and Tips
sponsored by Mimecast
EGUIDE: In this resource, find expert advice on how to stay ahead of cybercriminals using modern tools and techniques.
Posted: 31 Jul 2015 | Published: 01 Jul 2015

Mimecast

Benefits and Criteria for Selecting an Email Security Gateway Product
sponsored by Mimecast
EGUIDE: In this e-guide, experts shed light on three obscure benefits of email security gateways that many leaders are unaware of. You'll be steps closer to reaping these benefits when you discover five criteria for selecting gateway technology.
Posted: 30 Jul 2015 | Published: 15 Jul 2015

Mimecast

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: This white paper discusses the risks of email downtime and the importance of continuity in Microsoft Office 365 environments.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

Mimecast

Improving Enterprise Email Security: Systems and Tips
sponsored by SearchSecurity.com
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchSecurity.com

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by SearchSecurity.com
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

SearchSecurity.com

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Removing the Risks and Complexities of Business Email Management
sponsored by Iron Mountain
DATA SHEET: Email is central to all organizations and has become the most essential business application of all. As a result, the ability to continuously protect, store, manage and archive great volumes of email is now a key business issue; Iron Mountain's Total Email Management Suite is the answer.
Posted: 07 Jun 2013 | Published: 03 Jun 2009

Iron Mountain

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

Best Practices for Securing Exchange Email
sponsored by Perimeter eSecurity
WHITE PAPER: End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Perimeter eSecurity
1 - 25 of 41 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement