IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed    Add to Google    Add to My Yahoo!
E Mail Security Reports
 
The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Next-Gen Email Security and Advanced Threat Protection
sponsored by SonicWall
RESOURCE: SonicWall, a trusted security partner protecting more than a million business networks worldwide, announced a new email security platform and firewall for breach prevention against ransomware and other advanced threats. Discover how their platform integrates with advanced threat protection to deliver sound cloud-based cybersecurity.
Posted: 06 Mar 2017 | Published: 09 Feb 2017

SonicWall

Ransomware - Anatomy of an attack
sponsored by Cisco and Dimension Data
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco and Dimension Data

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement