IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure EmailReports
 
Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER: This brief infographic provides 7 essential steps for Web attack survival.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Imperva

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Return to sender: Improving email security with DMARC
sponsored by BitGlass
EGUIDE: This expert e-guide explains how domain-based messaging authentication, reporting and conformance (DMARC) can enhance your email security when the stakes are high for cyber attacks.
Posted: 09 Jul 2014 | Published: 09 Jul 2014


Dell Compellent for Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WEBCAST: Dell Compellent SANs help ensure high performance, cost-effective storage, simplified operations and data protection for all Microsoft Exchange 2010 environments. Check out this comprehensive webcast to learn how Dell Compellent SAN can help you manage Exchange 2010 storage complexity.
Posted: 27 Apr 2012 | Premiered: Apr 18, 2012, 01:00 EDT (05:00 GMT)

Dell, Inc.

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Security Labs Report
sponsored by M86 Security UK
WHITE PAPER: This Security Labs report offers insight into the significant trends and developments in web and email security today. View now to uncover key findings and gain recommendations on how to protect your organisation.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

M86 Security UK

Cisco Email Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco Systems, Inc.

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner
sponsored by Perimeter eSecurity
CASE STUDY: Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

CSC CloudMail for VMware Zimbra
sponsored by CSC
WHITE PAPER: Moving your messaging application to the cloud can help you lower TCO and increase integration by eliminating the need to maintain an in-house email system. Learn how you can enjoy a full suite of email, calendaring, sharing and document management abilities on any desktop or operating system with a cloud-based platform.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

CSC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement