IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed    Add to Google    Add to My Yahoo!
Secure EmailReports
 
Email Security Best Practices for Email Security as a Service
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

SearchSecurity.com

Cisco Email Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco Systems, Inc.

License to Kill Personal Storage Files
sponsored by C2C Systems
VIDEO: This exclusive video details the hidden threat personal storage files present and offers a free software trial that will help you locate, migrate and eliminate these files.
Posted: 11 Jul 2014 | Premiered: 12 May 2014

C2C Systems

The 7 Perils of PST Files
sponsored by C2C Systems
WHITE PAPER: This whitepaper details seven perils of personal storage files.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

C2C Systems

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012

Websense

Gartner Magic Quadrant for Unified Threat Management
sponsored by Sophos, Inc.
ANALYST REPORT: Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
Posted: 09 May 2013 | Published: 05 Mar 2012

Sophos, Inc.

Next-generation firewalls and your security strategy
sponsored by Cisco
WHITE PAPER: This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement