IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Authentication and Email Security Services

RSS Feed   
Authentication and Email Security Services White Papers (View All Report Types)
 
Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Leveraging security from the Cloud
sponsored by IBM
WHITE PAPER: Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

The GoAnywhere Book of Secure File Transfer Project Examples
sponsored by HelpSystems
WHITE PAPER: Managed file transfer (MFT) software is used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees—but it can still help solve problems outside of your basic file transfer needs.
Posted: 06 Dec 2018 | Published: 06 Dec 2018

HelpSystems

The Future of IT Service and Support
sponsored by TeamViewer
WHITE PAPER: Recent research concludes that companies who offer flexible work arrangements report higher job satisfaction, lower employee attrition, and a stronger company image overall. Find out how to keep IT support and self-service capabilities up to par for all employees and customers, regardless of location or access point.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

TeamViewer

How Managed File Transfer Addresses HIPAA Requirements for ePHI
sponsored by HelpSystems
WHITE PAPER: A well-designed MFT solution helps organizations meet the requirements of HIPAA and HITECH by implementing a managed and auditable solution. In this document, explore how a managed file transfer (MFT) can save your healthcare practice from costly data breaches and HIPAA violations.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

HelpSystems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement