IT Management  >   Systems Operations  >   Security  >   Messaging Security  >   Email Security  >  

e-Mail Filtering

RSS Feed   
e-Mail Filtering White Papers (View All Report Types)
 
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Business Value Analysis Study: Citizens Business Bank
sponsored by Symantec Corporation
WHITE PAPER: As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

All the Control and Visibility, None of the Risk: Experience Management Platforms
sponsored by NWN Corporation
WHITE PAPER: In this solution brief, learn how to enhance the user experience by integrating technologies, enabling customers to maximize technology investments and reduce complexity with experience management platforms. Open for more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

NWN Corporation

The Key Pillars for Protecting Sensitive Data in Any Organization
sponsored by Thales
WHITE PAPER: Today’s workforces are largely remote, redefining what’s traditionally been considered as the network perimeter. As a result, security strategies are being forced to evolve to protect sensitive data, regardless of where it resides. Read this white paper to learn more about implementing a data-centric security strategy.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

We Build Your Future Workflows
sponsored by ServiceNow
WHITE PAPER: Traditional IT needs to transform as it becomes the backbone for systems that have to be available around the clock, power AI solutions, and constantly improve the user experience. Read on to learn what makes Sofigate a leader in modernizing digital business workflows in the cloud.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

ServiceNow

The IT Product Owner: A Make or Break Role for Digital Transformation
sponsored by BreakFree Solutions
WHITE PAPER: The role of IT product owner, while required for doing cloud and digital at scale, is not a title you can simply bestow on high-performers interested in leading cloud initiatives. In fact, when establishing the role of IT product owners, it’s crucial to take a set approach that accomplishes 4 things. Learn how to get started in this guide.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

11 Recommended Security Practices to Manage the Container Lifecycle
sponsored by VMware Tanzu
WHITE PAPER: Development, security, and operations leaders all share a common concern: application security across the software development lifecycle. The problem is, no team wants to fully claim this challenge as their own. Download this guide to learn about 11 security practices that everyone can get behind.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

VMware Tanzu

ITAM Governance Best Practices
sponsored by Livingstone Tech
WHITE PAPER: IT asset management (ITAM) governance helps protect organizations against a variety of corporate risks and allows them to switch from being reactive to proactive in their risk mitigation. Open up this white paper to read up on everything ITAM governance, including the risks of poor ITAM governance, IT governance best practices and more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Livingstone Tech

The 10 Things Your MDR Service Must Do
sponsored by Rapid7
WHITE PAPER: Before assessing managed detection and response (MDR) vendors, it is crucial for an organization to evaluate each vendor based on 10 things they should be able to offer. Open up this white paper to uncover what to look for, including deep observation, threat validation and more.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
Rapid7
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info