IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed    Add to Google    Add to My Yahoo!
E Mail Security Reports
The state of email trust in 2014
sponsored by
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

Holistic Protection against Today's Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses how implementing a holistic threat protection technology can help you protect more of your network while spending less.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Faster Speed-to-Market Through Secure Information Sharing
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how to securely manage file systems and reduce complexity. Read on now to learn how to simplify data sharing with partners without the risk of data loss.
Posted: 28 Apr 2015 | Published: 04 Dec 2013

IntraLinks, Inc

Speed, Scale, Security: Orchestrating a Great Download Experience
sponsored by Limelight Networks, Inc.
WHITE PAPER: This white paper describes which systems, infrastructures, and processes can make your software available faster despite latency challenges. Learn how to optimize quick and efficient delivery of your files.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Limelight Networks, Inc.

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014


Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013


Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013


The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Raytheon|Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012


Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement