IT Management  >   Systems Operations  >   Security  >  

Secure Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Messaging Reports
 
Hacking the Human Operating System
sponsored by Intel
WHITE PAPER: In this white paper, you'll learn what warning signs to look out for to minimize the risk of a social engineering attack. Protect your enterprise from advanced hacking techniques with insight on how these hacks occur.
Posted: 06 Jan 2016 | Published: 31 Dec 2015

Intel

Reduce Risks and Protect Critical Information with Ease - Presentation Transcript
sponsored by Symantec
PRESENTATION TRANSCRIPT: The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

Symantec

Email Archiving: Do More with Less – Cut Costs and Improve Productivity
sponsored by Mirapoint Software, Inc.
WHITE PAPER: Learn how Mirapoint's RazorSafe™ email archiving appliance addresses email server management, end-user productivity, business mining, e-discovery, and audit challenges in an all-in-one solution.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Mirapoint Software, Inc.

City and Hackney Primary Care Trust
sponsored by Mirapoint Software, Inc.
CASE STUDY: Find out how National Health Service's (NHS) City and Hackney Primary Care Trust (PCT) used Mirapoint's RazorSafe 6000 email archiving appliance to solve the messaging challenges facing their Exchange servers.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Mirapoint Software, Inc.

Exchange Insider E-zine -- Volume 7: Five Things to Do Before Virtualizing Exchange Server 2010
sponsored by SearchExchange.com
EZINE: This issue demonstrates how to change default Outlook Web App settings and why you shouldn’t skip the tedious process of documenting a server migration project. Also learn the five critical elements you'll need to have in place before you plug in your first virtual machine.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

SearchExchange.com

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

Beaufort Memorial Case Study
sponsored by Imprivata
WHITE PAPER: This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: The cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness.
Posted: 18 May 2009 | Published: 15 May 2009

Red Hat and JBoss

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine

Managing PST Files: From Discovery to the Archive
sponsored by C2C Systems
WHITE PAPER: As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 
Posted: 20 May 2010 | Published: 20 May 2010

C2C Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement