IT Management  >   Systems Operations  >   Security  >  

Enterprise Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Messaging Security Reports
 
Managing Integrated Communications, Consumerization and Security: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

SearchSecurity.com

Domino Security Vulnerabilities to Watch For
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009
sponsored by Proofpoint, Inc.
WHITE PAPER: The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection.
Posted: 12 Aug 2009 | Published: 11 Aug 2009

Proofpoint, Inc.

Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Kroll Ontrack, Inc.

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
sponsored by SearchExchange.com
EBOOK: Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

SearchExchange.com

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement