IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

e-Mail Encryption

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Encryption Reports
 
Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by SearchSecurity.com
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

SearchSecurity.com

Why Email Security Matters: The Advantages of Hosted Protection
sponsored by Solarwinds MSP
EBOOK: Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Solarwinds MSP

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite
sponsored by Intel Security
PRODUCT LITERATURE: Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

Intel Security

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Removing the Risks and Complexities of Business Email Management
sponsored by Iron Mountain
DATA SHEET: Email is central to all organizations and has become the most essential business application of all. As a result, the ability to continuously protect, store, manage and archive great volumes of email is now a key business issue; Iron Mountain's Total Email Management Suite is the answer.
Posted: 07 Jun 2013 | Published: 03 Jun 2009

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement