IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure EmailReports
 
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In today’s business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people’s personal information at risk, and no country or industry is immune.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches
sponsored by Boldon James
WHITE PAPER: In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.

MDM Software: Benefits of Mobile Configuration Management
sponsored by Fiberlink
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Fiberlink

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

About to Buy Guide: Spam/virus protection for Exchange
sponsored by Mimecast
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

Mimecast

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by Good Technology
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

Good Technology

CSC CloudMail for VMware Zimbra
sponsored by CSC
WHITE PAPER: Moving your messaging application to the cloud can help you lower TCO and increase integration by eliminating the need to maintain an in-house email system. Learn how you can enjoy a full suite of email, calendaring, sharing and document management abilities on any desktop or operating system with a cloud-based platform.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

CSC

SMART Guidance for Notes Migrations Webinar
sponsored by BinaryTree
PRESENTATION: Watch this video to discover more about e-mail migration and what you can do in order to make your transition a success. Inside you’ll learn about managing migration, impacts of non-integration, and more.
Posted: 01 Aug 2013 | Published: 01 Aug 2013

BinaryTree
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement