Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security Software
DEFINITION: Software that protects an organization's sensitive and confidential data from accidental or intentional leaks.
Email Security SoftwareReports
1 - 25 of 69 Matches Previous Page  | Next Page
Modernizing your Enterprise Email Security
sponsored by TechTarget
RESOURCE: Email threats are continuing to evolve and become much more dynamic and targeted in nature. As these threats keep growing, how will you ensure email security? Take our brief survey on email security and in return you will gain immediate access to our expert eguide, Improving Enterprise Email Security: Systems and Tips"
Posted: 10 Nov 2014 | Published: 10 Nov 2014

TechTarget

Learn everything you need to know about Business Tablets & their effect on the industry
sponsored by ComputerWeekly.com
RESOURCE: Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Read this whitepaper to learn 10 steps to help you plan and execute a successful Exchange migration that preserves the user experience, ensures full compliance and business continuity, and ultimately boosts your overall productivity.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Consultants: How Can You Secure Your Information with Customers?
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway

The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012

Websense

Understanding Hosted Exchange Options
sponsored by SearchExchange.com
EGUIDE: This expert handbook examines the pros and cons of on-premise vs. off-premise Exchange environments. Learn more about how to weigh hosted Exchange options, the key security considerations and why new Office 365 versions are emphasizing subscriptions.
Posted: 09 May 2013 | Published: 09 May 2013

SearchExchange.com

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution
sponsored by Perimeter eSecurity
WHITE PAPER: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations.
Posted: 20 Jan 2012 | Published: 20 Jan 2012

Perimeter eSecurity

Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Websense, Inc.

Seven Criteria for Evaluating Security as-a-Service (SaaS) Solutions
sponsored by Websense, Inc.
WHITE PAPER: This white paper examines the security challenges organizations are facing today; addresses misconceptions about Security as-a-Service (SaaS); and provides criteria to help you evaluate SaaS solutions.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Websense, Inc.

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

Why Content Filters Can't Eradicate Spam
sponsored by Mimecast
WHITE PAPER: The vanguard of current spam management systems has been the content filter. These spam filters use various techniques applied to the words and content of email in order to determine whether the email should be allowed to the recipient or not. Read this white paper to learn more.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Mimecast

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks
sponsored by M86 Security
WHITE PAPER: Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively.
Posted: 27 May 2010 | Published: 30 Oct 2009

M86 Security

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

Email Security for Midsize Organizations
sponsored by McAfee, Inc.
PRODUCT OVERVIEW: Whether you address all five areas in a unified approach or concentrate on strengthening your email protection, McAfee has proven products and a dedicated focus to meet the requirements of your organization.
Posted: 24 Nov 2009 | Published: 11 Aug 2009

McAfee, Inc.
1 - 25 of 69 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement