Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

e-Mail Security Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security Software Reports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Make Your Cloud Email Migration a Smooth Transition
sponsored by Mimecast
WEBCAST: Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.
Posted: 26 Oct 2015 | Premiered: Feb 25, 2015

Mimecast

Email Archiving vs. Destructive Retention Policies
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Websense, Inc.

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Everything You Need to Know about Email and Web Security (But Were Afraid to Ask)
sponsored by Symantec Hosted Services
PRODUCT LITERATURE: What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of ...
Posted: 04 Sep 2007 | Published: 01 Jan 2006

Symantec Hosted Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement