IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Unsolicited Commercial e-Mail

RSS Feed    Add to Google    Add to My Yahoo!
Unsolicited Commercial e-Mail Reports
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Spam, Spammers, and Spam Control
sponsored by Trend Micro GmbH
WHITE PAPER: This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Posted: 25 Sep 2009 | Published: 06 Mar 2009

Trend Micro GmbH

Presentation Transcript: Iron Mountain - E-mail Management
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

Iron Mountain

E-Book: Driving Profitability through Information Security
sponsored by Astaro
EBOOK: While recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.
Posted: 27 Sep 2010 | Published: 27 Sep 2010


All-in-one Email Security Reduces Spam and IT Administration Time
sponsored by Sunbelt Software
CASE STUDY: After using an earlier version of Sunbelt’s enterprise anti-spam solution, Roberts Wesleyan College reviewed a number of software solutions and found Ninja to be the best product at the best price.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Sunbelt Software

Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Sunbelt Software

NAC: Managing Unauthorized Computers
sponsored by Sophos, Inc.
WHITE PAPER: Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent.
Posted: 18 Feb 2008 | Published: 01 Apr 2007

Sophos, Inc.

Beyond Spam - Email Security in the Age of Blended Threats
sponsored by EdgeWave
WHITE PAPER: In this paper, explore the new threat reality, including the tactics and designs cyber criminals are using today and uncover some of the next generation technologies that can help mitigate these threats.
Posted: 12 Mar 2012 | Published: 12 Mar 2012


Why Content Filters Can't Eradicate Spam
sponsored by Mimecast
WHITE PAPER: The vanguard of current spam management systems has been the content filter. These spam filters use various techniques applied to the words and content of email in order to determine whether the email should be allowed to the recipient or not. Read this white paper to learn more.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement