Business of Information Technology  >   Business Management  >   Content Management  >  

e-Mail Content Security Management

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Content Security ManagementReports
 
Take control of your records: HP Records Management Services
sponsored by Hewlett-Packard Company
WHITE PAPER: Discover how HP Records Management Services can help simplify compliance with regulatory mandates, boost collaboration and productivity, automate processes and provide secure access to document.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Hewlett-Packard Company

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Secure Mobile Printing with UniPrint
sponsored by Citrix Ready and UniPrint
WEBCAST: In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.
Posted: 03 Oct 2014 | Premiered: Oct 3, 2014

Citrix Ready and UniPrint

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007

IBM

The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Secure Internet Single Sign-On (SSO) 101
sponsored by Ping Identity Corporation
WHITE PAPER: Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.
Posted: 05 Jun 2009 | Published: 08 Jun 2009

Ping Identity Corporation

Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro
sponsored by Astaro
CASE STUDY: Medical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement