IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Unsolicited Bulk e-Mail

RSS Feed    Add to Google    Add to My Yahoo!
Unsolicited Bulk e-Mail Reports
 
The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

All-in-one Email Security Reduces Spam and IT Administration Time
sponsored by Sunbelt Software
CASE STUDY: After using an earlier version of Sunbelt’s enterprise anti-spam solution, Roberts Wesleyan College reviewed a number of software solutions and found Ninja to be the best product at the best price.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Sunbelt Software

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Xforce Trend and Risk Report 2010
sponsored by IBM
ANALYST REPORT: The IBM X-Force 2010 Trend and Risk Report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber threats.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by McAfee, Inc.
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

McAfee, Inc.

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

Why Cloud-Based Security and Archiving Make Sense
sponsored by Google Postini
WEBCAST: Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
Posted: 03 Jun 2010 | Premiered: Jun 3, 2010

Google Postini
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement