IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Email Security Policies Reports
1 - 25 of 79 Matches Previous Page  |  Next Page
5 Security Questions to Ask Before Selecting Office 365
sponsored by Mimecast
WHITE PAPER: IT professionals know that the same best practices for on-premises software deployments apply to the cloud, and they should be prepared when considering Office 365. Explore five questions to ask before deployment.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Automate email encryption to best protect corporate data
sponsored by ZixCorp
WHITE PAPER: This white paper provides an overview of why it's important to encrypt every corporate email you send and receive. Access now to learn how you can automatically encrypt emails eliminating the risk of interception and allowing your business peace of mind.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Impostor Email Threats infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic shows you some stats and facts about imposter emails research conducted on organizations across industries. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Impostor Email Threats eBook
sponsored by Proofpoint, Inc.
EBOOK: This white paper shows you what to looks for and how to block email attacks.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Hook, Line, and Sinker: How Credential Phishing is Changing
sponsored by Proofpoint, Inc.
WHITE PAPER: Find out the facts about phishing attacks and a 4-step strategy to stop them.
Posted: 04 Apr 2016 | Published: 30 Mar 2016

Proofpoint, Inc.

Guaranteed Business Continuity Thanks to Email Security Gateways
sponsored by LogicNow
RESOURCE: With business continuity on the line, protecting your email, network, and users is imperative. Are secure email gateways (ESGs) the only way to do so? This infographic reviews the many threats IT faces regarding IT security; take a look at how ESGs may prove themselves worthy.
Posted: 10 Mar 2016 | Published: 03 Feb 2016

LogicNow

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

The Insiders' View: Spear Phishing and the Enterprise
sponsored by Cloudmark
VIDEO: This panel discussion dives into the topic of spear phishing, the most effective hacking technique facing organizations today.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Cloudmark Trident: Stop Spear Phishing in its Tracks
sponsored by Cloudmark
VIDEO: 91% of the millions of cyber attacks launched each day come from email. Is your email security prepared to handle sophisticated spear phishing attacks? In this video, explore how hackers successfully land attacks and how you can bolster your email defenses.
Posted: 21 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks
sponsored by Cloudmark
RESOURCE: Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.
Posted: 18 Jan 2016 | Published: 06 Jan 2016

Cloudmark

Squash Large Business Email Security Challenges
sponsored by Mimecast
EGUIDE: This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis. Access now to learn how to overcome complexity in Exchange environments, incident response, and more.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Mimecast

Best Practices for Securing your Cloud Email Service
sponsored by Mimecast
EGUIDE: This eGuide explains how to weigh the two so your migration succeeds, and what criteria to look for in the security tools every email service needs.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Mimecast

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 16 Sep 2015 | Published: 28 Feb 2014

Mimecast

Post-Migration Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This white paper presents the 3 common expectations organizations have when moving to Office 365 and demystifies the hype around each. View now to learn the steps to take to ensure data security in the cloud-based email service.
Posted: 15 Sep 2015 | Published: 29 Jul 2015

Mimecast

Email Security in a Zero Trust World
sponsored by Mimecast
WHITE PAPER: In this white paper, you will learn why your organization needs to embrace a more secure, "Zero Trust" model to improve email security.
Posted: 14 Sep 2015 | Published: 05 Aug 2015

Mimecast

Mitigating the Top 3 Office 365 Security Risks
sponsored by Mimecast
WHITE PAPER: This white paper examines how to mitigate the 3 key high risk areas of Office 365 email security.
Posted: 14 Sep 2015 | Published: 02 Sep 2015

Mimecast

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
1 - 25 of 79 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement