Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security Software
DEFINITION: Software that protects an organization's sensitive and confidential data from accidental or intentional leaks.
Email Security Software Reports
1 - 25 of 86 Matches Previous Page  |  Next Page
Advanced Email Security
sponsored by Proofpoint, Inc.
RESOURCE: Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

The Compliance Benefits of a Modern Email Archiving Strategy
sponsored by Mimecast
WHITE PAPER: Email is central to compliance with the expanding number of business regulations across all regions and industries. This expert white paper explores how updating your email archiving process can help you prepare for new legislation, such as the GDPR.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Mimecast

That Insecure Feeling About Office 365 Email Security and Resilience
sponsored by Mimecast
WHITE PAPER: This expert white paper explores how you can overcome Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

modusCloud Email Security URL Defense
sponsored by Vircom
RESOURCE: Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Vircom

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec

Planning for Office 365 Gaps
sponsored by Mimecast
WHITE PAPER: Learn how to put a plan into action to keep your system safe from the 3 risks that Office 365 poses.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Mimecast

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY: Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Proofpoint, Inc.

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

Resetting Your Email Security Strategy
sponsored by Mimecast
WHITE PAPER: Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast

How the Risks of Ransomware are Increasing in Impact to Organizations
sponsored by Mimecast
WHITE PAPER: In this white paper, you'll learn how effective email security services can identify ransomware, prevent it from spreading, and restore data if the threat advances. Discover details on these three items.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Mimecast

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

Best Practices for Managing Risk in an Office 365 World
sponsored by Mimecast
WHITE PAPER: On the surface, Office 365 seems to meet key security criteria – until you consider the risks of single-vendor security protection in a cloud environment. Download this e-book now to learn best practices for managing risk in an Office 365 world.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Mimecast

Email Security in a Zero Trust World: Modern Email Security for the IT Security Professional
sponsored by Mimecast
WHITE PAPER: Uncover critical perspectives from CISOs and security administrators regarding email threats in cloud, digital, and legacy security environments. Learn what industry professionals have to say about a solid defense-in-depth strategy for email that protects mission-critical infrastructure and data.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 16 Sep 2015 | Published: 28 Feb 2014

Mimecast

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 86 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement