Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Security Software

RSS Feed   
ALSO CALLED: e-Mail Security Software
DEFINITION: Software that protects an organization's sensitive and confidential data from accidental or intentional leaks.
Email Security Software White Papers (View All Report Types)
1 - 25 of 27 Matches Previous Page  |  Next Page
Understanding Phishing: Banner Effectiveness
sponsored by Inky Technology
WHITE PAPER: Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

Inky Technology

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Zivver

Nine reasons why security leaders need to re-evaluate email security
sponsored by Zivver
WHITE PAPER: Access this white paper for the why, what and how of the 9 challenges organizations face to adequately protect data while still using ‘normal email’.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Zivver

Are Your Remote Workers Sitting Ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organizations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy
sponsored by Mimecast
WHITE PAPER: Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Cyber resilience for email
sponsored by Mimecast
WHITE PAPER: Did you know that 91% of all cyberattacks start with an email?In the world today, businesses are struggling to keep up with hackers. They need an approach that provides holistic protection, is adaptable and durable, and allows them to recover their data in the event of an attack.Read this white paper for a close look at one such approach.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

BLUEPRINT: MODERN LAYERED SECURITY
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Consultants: How Can You Secure Your Information with Customers?
sponsored by Globalscape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

Globalscape

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere
1 - 25 of 27 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences