IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed    Add to Google    Add to My Yahoo!
E Mail Security Reports
 
How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

SOC Blog
sponsored by Citrix
RESOURCE: This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.
Posted: 16 May 2016 | Published: 10 Mar 2016

Citrix

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Cloud Efficiencies and Hosted Email
sponsored by Apptix
EGUIDE: This whitepaper covers some information about cloud computing and dispels some myths about hosted Exchange email.
Posted: 25 Apr 2014 | Published: 25 Apr 2014

Apptix

Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Mobile Security: Email is Your Biggest Risk
sponsored by TITUS
WHITE PAPER: In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.
Posted: 02 May 2013 | Published: 31 Dec 2012

TITUS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement