IT Management  >   Systems Operations  >   Security  >  

Electronic Messaging Security

RSS Feed   
Electronic Messaging Security Reports
 
The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

TOPICS: 
ALTR

The New Rules of Email Deliverability
sponsored by SparkPost
WHITE PAPER: Take a closer look at this guide to get up to speed on the rapidly changing state of email deliverability, with 10 new rules including updates to old practices and emerging techniques.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

TOPICS: 
SparkPost

Texting and Compliance: Why Compliance Officers Should Say "Yes" to Text
sponsored by Smarsh
WHITE PAPER: What can compliance teams do to develop a compliant text message communication strategy? Explore this white paper to learn best practices for text messaging compliance.
Posted: 08 May 2018 | Published: 08 May 2018

TOPICS: 
Smarsh

Managing Integrated Communications, Consumerization and Security: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

TOPICS: 
SearchSecurity.com

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
RESOURCE: Ponemon Institute conducted a study to understand changes in the cost and consequences of web application and denial of service attacks. The report is divided into two sections. The first section addresses web application security and the second focuses on DoS attacks. Read this report to find key takeaways to help your organization.
Posted: 19 Dec 2018 | Published: 30 Jun 2018

TOPICS: 
Akamai Technologies

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

TOPICS: 
Trend Micro, Inc.

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

TOPICS: 
Information Security Magazine

Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

TOPICS: 
Intermedia Net

VeriSign Mobile Enterprise Services: Enabling Next-Generation Mobile Messaging for Enterprises
sponsored by VeriSign, Inc
WHITE PAPER: This Solution Paper provides an overview of the rapidly growing mobile messaging and alerts market, and introduces a solution that addresses that market: VeriSign Mobile Messaging, an offering of VeriSign Mobile Enterprise Services (VMES).
Posted: 05 Jun 2009 | Published: 02 Dec 2008

TOPICS: 
VeriSign, Inc

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

TOPICS: 
Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement