Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Encryption Software Reports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Entrust Entelligenceâ„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Bots to the Future – Why Bot Management Solutions are Necessary to Stop Hackers
sponsored by Akamai Technologies
RESEARCH CONTENT: This Frost and Sullivan review seeks to explore the challenges presented by bots, emerging solutions for bot management, and the potential market for these systems.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Akamai Technologies

Secure Mobile App Development with PowWow Smart UX & VMware Workspace ONE
sponsored by PowWow
WHITE PAPER: Learn how to create, secure, deploy, and manage next-gen mobile apps quickly and efficiently with the PowWow Smart UX and VMware Workspace ONE platforms.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

PowWow

Streamline SharePoint Integration with Low-Code Development
sponsored by K2
WEBCAST: Discover how visual, low-code app development in tandem with BPM has the ability to expand on traditional IT's capacity to deliver apps rapidly that enhance agility without putting a strain on limited resources. Plus, access a demo on how to facilitate SharePoint integration with low-code tools.
Posted: 12 Oct 2017 | Premiered: Oct 6, 2017

K2

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Analytic Stories or; "How I Learned to Stop Worrying and Respond to Threats"
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement