IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Unsolicited Commercial e-Mail

RSS Feed    Add to Google    Add to My Yahoo!
Unsolicited Commercial e-Mail Reports
 
Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

Enterprise Device Management: A Brave New World
sponsored by SearchSecurity.com
EGUIDE: Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.
Posted: 06 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by Intel Security
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

Intel Security

E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE: If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

NETGEAR Inc.

Comprehensive Protection for Email and Web: The World's Most Critical Business Applications
sponsored by Fortinet, Inc.
WHITE PAPER: Email and the web have revolutionized business communication, providing an unmatched blend of reach, scalability, timeliness, efficiency and overall effectiveness.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Email Security Eguide
sponsored by Sunbelt Software
WHITE PAPER: Email security and spam only get more difficult to control as spammers get more sophisticated. Read this eGuide from SearchWindowsSecurity.com contributors to get a better understanding of just how big a threat spam is and what to do about it.
Posted: 01 Jun 2007 | Published: 01 Jun 2007

Sunbelt Software

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: This white paper touches on a new malware protection system that was designed for today and tomorrow. It provides the best overall protection for all businesses and does this with the best total cost of protection available today.
Posted: 12 May 2011 | Published: 11 May 2011

Kaspersky Lab

That Was Then This Is Now: The New Rules of Email Marketing
sponsored by Silverpop Systems Inc. an IBM Company
WHITE PAPER: In this new era of CAN-SPAM legislation, overflowing inboxes and ever-increasing customer expectations, many of the practices that worked for emailers in the past simply won't work anymore. This paper reviews the new rules of email marketing.
Posted: 08 Aug 2008 | Published: 01 Jan 2004

Silverpop Systems Inc. an IBM Company

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement