IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Policies Reports
 
Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

The Real Identity behind a Wave of Cyberattacks on Energy, Mining and Infrastructure Companies
sponsored by Check Point Software Technologies Ltd.
RESOURCE: This case study explores how, using a remote access Trojan known as NetWire and a keylogging program Hawkeye, a Nigerian hacker was able to steal thousands of dollars from companies. Read on to discover the larger trend of business email compromise attacks, and how you can better prepare your company to defend against them in the future.
Posted: 16 Oct 2017 | Published: 15 Sep 2017

Check Point Software Technologies Ltd.

How to Avoid Targeted Web and Email Attacks
sponsored by M86 Security
WHITE PAPER: This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

M86 Security

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway

Email Archiving: Planning, Policies, and Product Selection - Chapter 2: Defining an Email Archiving Policy
sponsored by Symantec Corporation, created by SearchExchange.com
BOOK: Email archiving policies are the leading way to hedge against litigation of email misuse or questionable deletions. Read the second chapter of this email archiving ebook and get best practices on archiving policies, retention and staff responsibili...
Posted: 06 Jun 2007 | Published: 06 Jun 2007

Symantec Corporation, created by SearchExchange.com

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Impactful Email Marketing: Using Behavioral Analytics to Create Relevant Messages
sponsored by Bronto Software
WHITE PAPER: A successful strategy for taking your email marketing/web analytics integration beyond traffic analysis is to use web analytics for gauging effectiveness of email marketing initiatives and determining optimization tactics.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

Bronto Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement