IT Management  >   Systems Operations  >   Security  >  

Secure Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Messaging Reports
 
Managing PST Files: From Discovery to the Archive
sponsored by C2C Systems
WHITE PAPER: As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 
Posted: 20 May 2010 | Published: 20 May 2010

C2C Systems

Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Kroll Ontrack, Inc.

Special Reports on Modernizing Messaging Infrastructure
sponsored by Sendmail, Inc.
NEWSLETTER: In this research note, Gartner outlines the top indicators of a potential IT train wreck in regards to messaging solutions.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Sendmail, Inc.

A Guide to Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

Domino Security Vulnerabilities to Watch For
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

Reduce Risks and Protect Critical Information with Ease - Presentation Transcript
sponsored by Symantec
PRESENTATION TRANSCRIPT: The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

Symantec

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

Why You Should Consider Hosted Messaging Security
sponsored by Trend Micro GmbH
WHITE PAPER: In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.
Posted: 25 Sep 2009 | Published: 19 Feb 2009

Trend Micro GmbH

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Exchange Insider E-Zine - Volume 2: Best and Worst Practices for Email Archiving
sponsored by SearchExchange.com
EZINE: Meeting regulatory requirements means that administrators must carve out a sound email-archiving policy; making the wrong move can be costly. In this issue, you'll learn what to do and what not to do when planning your email-archiving strategy.
Posted: 14 Jul 2009 | Published: 14 Jul 2009

SearchExchange.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement