IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure EmailReports
 
Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Email Security Best Practices for Email Security as a Service
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

SearchSecurity.com

The 7 Perils of PST Files
sponsored by C2C Systems
WHITE PAPER: This whitepaper details seven perils of personal storage files.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

C2C Systems

Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
Posted: 28 Aug 2012 | Published: 21 Aug 2012

Dell Software

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement