IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spamming

RSS Feed    Add to Google    Add to My Yahoo!
Spamming Reports
 
The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Xforce Trend and Risk Report 2010
sponsored by IBM
ANALYST REPORT: The IBM X-Force 2010 Trend and Risk Report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber threats.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Podcast: Cutting Infrastructure Costs by Stopping Unwanted Mail at the Perimeter: Introduction to Stopping Unwanted Mail
sponsored by Sendmail, Inc.
PODCAST: This new Ask the Expert podcast series focuses on how businesses can significantly cut costs by modernizing their messaging infrastructure and stopping unwanted mail from ever touching it.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

The Essential Guide to Protecting Essential Information
sponsored by Websense, Inc.
PRODUCT LITERATURE: Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Websense, Inc.

That Was Then This Is Now: The New Rules of Email Marketing
sponsored by Silverpop Systems Inc. an IBM Company
WHITE PAPER: In this new era of CAN-SPAM legislation, overflowing inboxes and ever-increasing customer expectations, many of the practices that worked for emailers in the past simply won't work anymore. This paper reviews the new rules of email marketing.
Posted: 08 Aug 2008 | Published: 01 Jan 2004

Silverpop Systems Inc. an IBM Company

Information Security Magazine November 2009: Stay in Control
sponsored by Information Security Magazine
EZINE: Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

Information Security Magazine

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement