IT Management  >   Systems Operations  >   Security  >  

Secure Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure MessagingReports
 
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Password Change Service - Avaya CallPilot
sponsored by Global Knowledge
WHITE PAPER: Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator how to set up and utilize Password Reset Service, introduced with CallPilot Release 5.
Posted: 29 Mar 2013 | Published: 20 Mar 2013

Global Knowledge

Email Archiving: Planning, Policies and Product Selection - Chapter 3
sponsored by SearchExchange.com
EBOOK: It's critical to identify the key features when selecting an email-archiving system for risk reduction. The most important part of the process is defining the company's email-retention goals and policies. This chapter will discuss several tips for choosing the proper email-archiving product features for your organization.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

SearchExchange.com

Spam, Spammers, and Spam Control
sponsored by Trend Micro GmbH
WHITE PAPER: This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Posted: 25 Sep 2009 | Published: 06 Mar 2009

Trend Micro GmbH

From Server to Service: Demystifying Messaging in the Cloud
sponsored by Dimension Data.
ANALYST BRIEF: This document looks at the various considerations for messaging in the cloud and the immediate requirements that need to be considered if you have a future vision for messaging in the cloud.
Posted: 25 Jun 2010 | Published: 25 Jun 2010

Dimension Data.

Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
sponsored by SearchExchange.com
EZINE: In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
Posted: 16 Apr 2009 | Published: 15 Apr 2009

SearchExchange.com

The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER: This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008

Trend Micro, Inc.

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

Domino Security Vulnerabilities to Watch For
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement