IT Management  >   Systems Operations  >   Security  >  

Internet Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Messaging Security Reports
 
Managing Integrated Communications, Consumerization and Security: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

SearchSecurity.com

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

Best Practices in Instant Messaging Management
sponsored by Dell Software
WHITE PAPER: Instant messaging is a powerful tool, but is your organization protected from malware/viruses, reduced productivity and accidental transfer of sensitive documents? Read this paper to learn how to mitigate these risks.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

Dell Software

Optimizing Exchange High Availability - A New Approach
sponsored by Marathon Technologies
WHITE PAPER: Businesses of all sizes are using the messaging and collaboration features of Microsoft Exchange to run critical business functions that if lost, can result in severe business disruption. Exchange and Exchange infrastructure components are analyzed in this paper to determine how they can be protected so you can achieve your SLA commitments.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

Marathon Technologies

Managing PST Files: From Discovery to the Archive
sponsored by C2C Systems
WHITE PAPER: As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 
Posted: 20 May 2010 | Published: 20 May 2010

C2C Systems

Collaboration without Boundaries
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW: IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative.
Posted: 20 Apr 2008 | Published: 01 Apr 2008

Red Hat and JBoss

Spam, Spammers, and Spam Control
sponsored by Trend Micro GmbH
WHITE PAPER: This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Posted: 25 Sep 2009 | Published: 06 Mar 2009

Trend Micro GmbH

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement