Business of Information Technology  >   Business Management  >   Content Management  >  

Email Content Security Management

RSS Feed   
Email Content Security Management Reports
 
2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

TOPICS: 
DomainTools

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

TOPICS: 
SearchSecurity.com

Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Forcepoint

Driving Radical Customer Service Innovation
sponsored by ServiceNow
EBOOK: Customer service has changed in recent years. Customers can voice their opinions easily over the internet, have more options, can leave vendors more easily and are demanding high-level customer service. Read this e-book to learn about how you can drive customer service innovation within your organization and keep your customers satisfied.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

TOPICS: 
ServiceNow

Ceragon Networks Embraces BYOD with Symantec Endpoint Protection Mobile
sponsored by Symantec
CASE STUDY: As mobile and BYOD usage escalated at Ceragon Networks, they realized that mobile device management was not a complete mobile security solution. In order to secure their mobile security, they needed something more active. Download this case study to see the many benefits Ceragon Networks saw when deploying Symantec Endpoint Protection Mobile.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

TOPICS: 
Microsoft

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

TOPICS: 
Cisco Systems, Inc.

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

TOPICS: 
Cisco Systems, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

TOPICS: 
Sophos

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

TOPICS: 
Aladdin Knowledge Systems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement