IT Management  >   Systems Operations  >   Security  >  

Enterprise Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Messaging Security Reports
 
Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by SearchSecurity.com
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

SearchSecurity.com

Email Archiving: Do More with Less – Cut Costs and Improve Productivity
sponsored by Mirapoint Software, Inc.
WHITE PAPER: Learn how Mirapoint's RazorSafe™ email archiving appliance addresses email server management, end-user productivity, business mining, e-discovery, and audit challenges in an all-in-one solution.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Mirapoint Software, Inc.

Spam, Spammers, and Spam Control
sponsored by Trend Micro GmbH
WHITE PAPER: This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Posted: 25 Sep 2009 | Published: 06 Mar 2009

Trend Micro GmbH

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by Intel Security
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

Intel Security

Collaboration without Boundaries
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW: IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative.
Posted: 20 Apr 2008 | Published: 01 Apr 2008

Red Hat and JBoss

Exchange Insider E-Zine - Volume 2: Best and Worst Practices for Email Archiving
sponsored by SearchExchange.com
EZINE: Meeting regulatory requirements means that administrators must carve out a sound email-archiving policy; making the wrong move can be costly. In this issue, you'll learn what to do and what not to do when planning your email-archiving strategy.
Posted: 14 Jul 2009 | Published: 14 Jul 2009

SearchExchange.com

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Extend the Value of IBM Lotus Applications to Increase Productivity with Avaya Unified Communications - Sponsored by Avaya and IBM
sponsored by Avaya
WHITE PAPER: Good communications are key to any company's success. The most successful enterprises strive for anywhere, anytime communications to best serve employees and clients who are increasingly mobile and geographically diverse. By unifying communications, a company can deliver communications anywhere, anytime and any way.
Posted: 25 Jun 2009 | Published: 25 Jun 2009

Avaya
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement