IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Filtering Services

RSS Feed    Add to Google    Add to My Yahoo!
Email Filtering ServicesReports
 
Antispam in the Midmarket: Trends and Strategies
sponsored by McAfee, Inc.
PODCAST: Listen in as Stephen Cobb details the latest spam challenges CIOs in the midmarket are facing. Learn more about the latest antispam techniques and trends that you can use to fight spam in this expert podcast.
Posted: 21 Apr 2008 | Premiered: Apr 21, 2008, 09:00 EDT (13:00 GMT)

McAfee, Inc.

Emerging Security Threats: Know Your Enemy in 2014
sponsored by BitGlass
WEBCAST: In this webinar, discover the process that cybercrime undergoes and how it directly affects the victim.
Posted: 11 Jul 2014 | Premiered: Jun 24, 2014


Anti-spam tricks for the midmarket toolbox
sponsored by McAfee, Inc.
PODCAST: Listen in as Stephen Cobb, adjunct professor of Information Assurance at Norwich University, Vermont, and president of Cobb Associates, discusses the spam challenges that are facing CIOs in the midmarket.
Posted: 01 Oct 2008 | Premiered: Oct 1, 2008

McAfee, Inc.

City of Manassas Takes Control of Personal Storage Files
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how one city government took control of its personal storage files.
Posted: 07 Jul 2014 | Published: 02 Jul 2013

C2C Systems

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

Why You Should Consider Cloud-Based Email Archiving
sponsored by Perimeter eSecurity
WHITE PAPER: This whitepaper, authored by messaging industry analyst The Radicati Group, looks at the key reasons organizations should consider moving to a cloud-based archiving solution.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Perimeter eSecurity

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement