Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Encryption Software Reports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Modernize Your App Portfolio to Drive Efficiency and Save Money
sponsored by Flexera Software
VIDEO: In this brief video, learn how a company modernized their overgrown application portfolio with a consolidation process. See how this strategy readied their apps for new technology, enabled efficiency, brought in savings, and more.
Posted: 22 Jan 2016 | Premiered: 22 Jan 2016

Flexera Software

Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AlienVault
WHITE PAPER: This guide provides an overview of some of the most popular Open Source IDS tools, along with pros/cons of each.
Posted: 19 Jan 2016 | Published: 06 Jan 2016

AlienVault

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.
Posted: 18 Jan 2016 | Premiered: Jan 6, 2016

AlienVault

Orchestrating the DevOps Tool Chain
sponsored by CA Technologies
WHITE PAPER: This white paper examines the implications of our "application economy" from a software development and deployment perspective, and introduces ideas on how you can embrace DevOps practices. Topics include: DevOps and continuous delivery, automation of the operational environment, and more.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

CA Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement