IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Policies

RSS Feed    Add to Google    Add to My Yahoo!
Email Policies Reports
 
Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

SearchSecurity.com

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Secure Enterprise e-mail Solutions with Microsoft® Exchange
sponsored by OnX USA LLC
PRODUCT LITERATURE: This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.
Posted: 20 Feb 2008 | Published: 01 Dec 2003

OnX USA LLC

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway

The Case for Server-Based Messaging Security Solutions - Webcast
sponsored by Sunbelt Software
WEBCAST: What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution?
Posted: 08 Aug 2008 | Premiered: Aug 8, 2008

Sunbelt Software

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement