IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Policies

RSS Feed    Add to Google    Add to My Yahoo!
Email Policies Reports
How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015


The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: Email downtime can translate to big losses for your business, especially in Microsoft Office 365 environments. This valuable report explains how implementing a continuity strategy can enable your users to continue working even when service is unavailable.
Posted: 14 Aug 2013 | Published: 30 Apr 2013


Email Security in a Zero Trust World
sponsored by Mimecast
WHITE PAPER: In this white paper, you will learn why your organization needs to embrace a more secure, "Zero Trust" model to improve email security.
Posted: 14 Sep 2015 | Published: 05 Aug 2015


Information Governance Perspectives from RSD: E-mail Archiving
sponsored by RSD
WHITE PAPER: With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions
Posted: 17 Aug 2009 | Published: 17 Aug 2009


The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Antimalware E-Guide
sponsored by Sunbelt Software
EGUIDE: This E-Guide from and Sunbelt Software defines the malware problem, discusses the enhancements and gaps in Windows Vista and offers some suggestions of how to remove malware from windows systems.
Posted: 25 Nov 2008 | Published: 01 Jun 2007

Sunbelt Software

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014


The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Raytheon|Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012


Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement