IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Policies

RSS Feed    Add to Google    Add to My Yahoo!
Email Policies Reports
 
IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Email Security for Midsize Organizations
sponsored by McAfee, Inc.
PRODUCT OVERVIEW: Whether you address all five areas in a unified approach or concentrate on strengthening your email protection, McAfee has proven products and a dedicated focus to meet the requirements of your organization.
Posted: 24 Nov 2009 | Published: 11 Aug 2009

McAfee, Inc.

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Exchange Server administration policy: Managing privileged user access
sponsored by F5 Networks
EGUIDE: Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

F5 Networks

eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK: Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Symantec Corporation

Reducing Archiving Costs by Implementing Email Labelling Technology
sponsored by Boldon James
WHITE PAPER: This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement