IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure EmailReports
 
Expert E-zine: Who has access to your email?
sponsored by SearchSecurity.com
EZINE: In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.
Posted: 15 Dec 2011 | Published: 14 Dec 2011

SearchSecurity.com

How to prevent phishing attacks: User awareness and training
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

SearchSecurity.com

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Improve Your Enterprise Email Systems with HP Messaging Services
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces HP Messaging Services, which helps companies to improve the reliability and performance of enterprise email systems and better manage their email infrastructure.
Posted: 04 Sep 2014 | Published: 30 Apr 2013

Hewlett-Packard Limited

The 7 Perils of PST Files
sponsored by C2C Systems
WHITE PAPER: This whitepaper details seven perils of personal storage files.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

C2C Systems

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Info Tech: Email Archiving Vendor Landscape
sponsored by CommVault Systems, Inc.
WHITE PAPER: Access this guide for information to help you evaluate, select and deploy email archiving solutions, and deepen your understanding of offerings from 11 vendors.
Posted: 13 May 2014 | Published: 13 May 2014

CommVault Systems, Inc.

Exchange Server administration policy: Managing privileged user access
sponsored by F5 Networks
EGUIDE: Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

F5 Networks

Six Email Security Best Practices for Email SaaS
sponsored by Symantec Corporation
EGUIDE: Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement