IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure Email Reports
 
Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Enterprise Security in Asia: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

Online Archiving Now Easier Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises. Learn how it not only covers your bases when catastrophe looms, but also provides robust security to your messages.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

5 Security Questions to Ask Before Selecting Office 365
sponsored by Mimecast
WHITE PAPER: True IT professionals know that the same best practices for on-premises software deployments apply to the cloud, and they should be wary when considering Office 365. Explore five questions to ask before your Office 365 deployment.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

Email Archiving vs. Destructive Retention Policies
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Benefits and Criteria for Selecting an Email Security Gateway Product
sponsored by Mimecast
EGUIDE: In this e-guide, experts shed light on three obscure benefits of email security gateways that many leaders are unaware of. You'll be steps closer to reaping these benefits when you discover five criteria for selecting gateway technology.
Posted: 30 Jul 2015 | Published: 15 Jul 2015

Mimecast

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement