IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Policies

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Policies Reports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

How Raque Food Systems Bolstered Their Anti-Spam Strategy
sponsored by GFI
CASE STUDY: This case study explores how Raque Food Systems, a food packaging machine manufacturer, used a multi-faceted messaging security tool. Find out how to confront the growing spam security threat, protect your servers from malicious malware attacks, and increase employee productivity.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

GFI

Reducing Archiving Costs by Implementing Email Labelling Technology
sponsored by Boldon James
WHITE PAPER: This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Using Classification to Manage Email Policy for the Enterprise
sponsored by TITUS
WHITE PAPER: Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.
Posted: 09 Nov 2007 | Published: 01 Jan 2006

TITUS

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006

SonicWALL

How to Avoid Targeted Web and Email Attacks
sponsored by M86 Security
WHITE PAPER: This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

M86 Security

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Information Governance Perspectives from RSD: E-mail Archiving
sponsored by RSD
WHITE PAPER: With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions
Posted: 17 Aug 2009 | Published: 17 Aug 2009

RSD
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement