Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security Software
DEFINITION: Software that protects an organization's sensitive and confidential data from accidental or intentional leaks.
Email Security Software Reports
1 - 25 of 86 Matches Previous Page  |  Next Page
Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Worse than Spam: How to Identify and Mitigate Exploitative Emails
sponsored by Mimecast
EGUIDE: Experts have laid out top email attacks that threat actors are committing today. Explore ways to identify each one, and how various companies have handled (or mishandled) these cyber-crimes. Once you've identified what to look for, you'll also learn how to establish email security best practices.
Posted: 03 Jun 2016 | Published: 15 May 2016

Mimecast

The Top Email Data Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This webinar examines common risks you may come across with Office 365. View now to explore the state of email threats, and how to augment your Office 365 deployment with proper protection strategies.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

Don't Settle for Passé Email Protection
sponsored by Mimecast
WEBCAST: In this webinar, you'll learn the basics on how to beef up your email protection strategy. Prepare yourself, your colleagues, and your organization for advancements in this evolving imperative.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

There Will Be Attacks: Prepare Your Email Defenses
sponsored by Mimecast
WEBCAST: Your organization can't tolerate any email downtime. Learn how to prevent damages to money, your reputation, and business operations with the right arsenal of email security tools.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: Technology alone won't stop phishing attacks; empowering employees to prevent incidents is critical. Uncover ways to boost this level of security awareness, and help users protect themselves and the enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

Top Five CEO Wire Fraud Attacks
sponsored by Cloudmark
RESOURCE: As an attack, the CEO email wire fraud attack couldn't be simpler. There's no malware to write and no malicious code or links to implant. It's a text only email, plain and simple - but it's the social engineering that makes it work.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

Cloudmark

5 Security Questions to Ask Before Selecting Office 365
sponsored by Mimecast
WHITE PAPER: True IT professionals know that the same best practices for on-premises software deployments apply to the cloud, and they should be wary when considering Office 365. Explore five questions to ask before your Office 365 deployment.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Email Archiving vs. Destructive Retention Policies
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: Discover spear phishing as a catastrophic threat to an enterprise, how the tactic is deployed, and how it evades conventional defenses. Read on to learn how to counter it with a solution that uses next-generation context analysis and behavioral learning, real-time reporting dashboards, and more.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Stop Spear Phishing in its Tracks
sponsored by Cloudmark
VIDEO: In a recent survey, 84% of companies said spear phishing attacks got through their defenses. Is your email security prepared to handle sophisticated spear phishing attacks? In this video, explore how hackers successfully land attacks and how you can bolster your email defenses.
Posted: 21 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Best Practices for Securing your Cloud Email Service
sponsored by Mimecast
EGUIDE: This eGuide explains how to weigh the two so your migration succeeds, and what criteria to look for in the security tools every email service needs.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Mimecast

Make Your Cloud Email Migration a Smooth Transition
sponsored by Mimecast
WEBCAST: Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.
Posted: 26 Oct 2015 | Premiered: Feb 25, 2015

Mimecast

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 16 Sep 2015 | Published: 28 Feb 2014

Mimecast

Post-Migration Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This white paper presents the 3 common expectations organizations have when moving to Office 365 and demystifies the hype around each. View now to learn the steps to take to ensure data security in the cloud-based email service.
Posted: 15 Sep 2015 | Published: 29 Jul 2015

Mimecast

Email Security in a Zero Trust World
sponsored by Mimecast
WHITE PAPER: In this white paper, you will learn why your organization needs to embrace a more secure, "Zero Trust" model to improve email security.
Posted: 14 Sep 2015 | Published: 05 Aug 2015

Mimecast

Mitigating the Top 3 Office 365 Security Risks
sponsored by Mimecast
WHITE PAPER: This white paper examines how to mitigate the 3 key high risk areas of Office 365 email security.
Posted: 14 Sep 2015 | Published: 02 Sep 2015

Mimecast

4 Critical Risks Facing Microsoft Office 365 Implementation
sponsored by Mimecast
WHITE PAPER: This white paper presents the 4 critical risks facing Microsoft Office 365 implementation and how to mitigate each one.
Posted: 01 Jul 2015 | Published: 24 Jun 2015

Mimecast

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
1 - 25 of 86 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement