Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

Email Decryption Software

RSS Feed   
Email Decryption Software Reports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Protecting Microsoft Exchange
sponsored by Double-Take Software
WHITE PAPER: Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.
Posted: 16 Nov 2009 | Published: 14 Oct 2009

Double-Take Software

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Bridging Traditional & Continuous Testing
sponsored by Plutora
EBOOK: DevOps practices and test automation activities are forcing traditional testing teams to make considerable changes. Both roles and tools are being updated and you need to adapt in order to survive. Read this e-book to learn how your testing team can adapt to these changes and how to implement these changes in your testing strategy.
Posted: 07 Feb 2018 | Published: 07 Feb 2018


Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

Cloud Application Architecture Guide
sponsored by Microsoft
EBOOK: When it comes to designing cloud apps that are scalable, resilient, and highly available, there are a number of considerations to keep in mind – starting with your architecture. Discover best practices for taking a structured approach to building cloud apps and selecting an architecture that suits your development projects.
Posted: 06 Feb 2018 | Published: 31 Dec 2017

Microsoft

Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics

The Evolution of Agile Portfolio Management
sponsored by Tasktop
WEBCAST: Find out how to implement Agile portfolio management so that you can help departments collaborate with relevant data while still maintaining their autonomy.
Posted: 06 Feb 2018 | Premiered: Feb 6, 2018

Tasktop
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement