IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Policies Reports
Email Security Checklist: Eight Steps for Success
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014


Post-Migration Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This white paper presents the 3 common expectations organizations have when moving to Office 365 and demystifies the hype around each. View now to learn the steps to take to ensure data security in the cloud-based email service.
Posted: 15 Sep 2015 | Published: 29 Jul 2015


Email Security in a Zero Trust World
sponsored by Mimecast
WHITE PAPER: In this white paper, you will learn why your organization needs to embrace a more secure, "Zero Trust" model to improve email security.
Posted: 14 Sep 2015 | Published: 05 Aug 2015


Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Impactful Email Marketing: Using Behavioral Analytics to Create Relevant Messages
sponsored by Bronto Software
WHITE PAPER: A successful strategy for taking your email marketing/web analytics integration beyond traffic analysis is to use web analytics for gauging effectiveness of email marketing initiatives and determining optimization tactics.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

Bronto Software

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

All-in-one Email Security Reduces Spam and IT Administration Time
sponsored by Sunbelt Software
CASE STUDY: After using an earlier version of Sunbelt’s enterprise anti-spam solution, Roberts Wesleyan College reviewed a number of software solutions and found Ninja to be the best product at the best price.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Sunbelt Software

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014


Reducing Archiving Costs by Implementing Email Labelling Technology
sponsored by Boldon James
WHITE PAPER: This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement