IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Policies Reports
 
IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: Email downtime can translate to big losses for your business, especially in Microsoft Office 365 environments. This valuable report explains how implementing a continuity strategy can enable your users to continue working even when service is unavailable.
Posted: 14 Aug 2013 | Published: 30 Apr 2013

Mimecast

Case Study: Community Bank Improves Both Security and Productivity
sponsored by Clearswift
CASE STUDY: Read this case study to discover how a community bank overhauled its e-mail security to ensure both data protection and employee productivity.
Posted: 28 May 2015 | Published: 06 May 2015

Clearswift

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Email Security in the Cloud: More Secure! Compliant! Less Expensive!
sponsored by McAfee, Inc.
ANALYST BRIEF: Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.
Posted: 08 Aug 2011 | Published: 01 Apr 2010

McAfee, Inc.

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Mobile Security: Email is Your Biggest Risk
sponsored by TITUS
WHITE PAPER: In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.
Posted: 02 May 2013 | Published: 31 Dec 2012

TITUS

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.
Posted: 07 Oct 2009 | Published: 15 Dec 2008

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement