Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Encryption SoftwareReports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Content Encryption: Reduce Risk, Liability and Costs
sponsored by Proofpoint, Inc.
WHITE PAPER: Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry.
Posted: 31 Aug 2011 | Published: 31 Aug 2011

Proofpoint, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

HR in the Cloud
sponsored by Workday
WHITE PAPER: This whitepaper examines the five big trends that are pushing adoption, examining each trend in-depth and explaining exactly why it is driving a need for SaaS.
Posted: 07 Oct 2014 | Published: 25 Feb 2013

Workday

Software Quality Assurance Testing: First Mobile Steps
sponsored by IBM
EGUIDE: The process for testing mobile applications isn't quite the same as testing more traditional Web and desktop ones. In this e-guide, uncover 4 valuable tips to help software quality assurance teams successfully approach mobile app testing.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

IBM

Addressing Big Data Storage Needs
sponsored by Red Hat
EGUIDE: In this expert e-guide, examine how software defined storage (SDS) influences data storage infrastructure. Additionally, explore how cloud-based nearline storage has adapted in recent years to meet big data needs as well as advice on how to select public, private or hybrid cloud to meet storage needs.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement