IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Email Security Policies Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
The Real Identity behind a Wave of Cyberattacks on Energy, Mining and Infrastructure Companies
sponsored by Check Point Software Technologies Ltd.
RESOURCE: This case study explores how, using a remote access Trojan known as NetWire and a keylogging program Hawkeye, a Nigerian hacker was able to steal thousands of dollars from companies. Read on to discover the larger trend of business email compromise attacks, and how you can better prepare your company to defend against them in the future.
Posted: 16 Oct 2017 | Published: 15 Sep 2017

Check Point Software Technologies Ltd.

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.
Posted: 15 Aug 2017 | Published: 31 Jul 2017

Mimecast

The Compliance Benefits of a Modern Email Archiving Strategy
sponsored by Mimecast
WHITE PAPER: Email is central to compliance with the expanding number of business regulations across all regions and industries. This expert white paper explores how updating your email archiving process can help you prepare for new legislation, such as the GDPR.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Mimecast

That Insecure Feeling About Office 365 Email Security and Resilience
sponsored by Mimecast
WHITE PAPER: This expert white paper explores how you can overcome Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec

Enterprise Phishing Susceptibility and Resiliency Report
sponsored by PhishMe
WHITE PAPER: Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

PhishMe

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY: Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Proofpoint, Inc.

How the Risks of Ransomware are Increasing in Impact to Organizations
sponsored by Mimecast
WHITE PAPER: In this white paper, you'll learn how effective email security services can identify ransomware, prevent it from spreading, and restore data if the threat advances. Discover details on these three items.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Mimecast

Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement