IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Security Policies

RSS Feed   
Email Security Policies Reports
1 - 25 of 99 Matches Previous Page  |  Next Page
One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Splunk

Dutch DIY Giant Shelves Email Attacks
sponsored by Barracuda
CASE STUDY: As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Barracuda

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

The Human Factor 2019 Report
sponsored by Proofpoint
ANALYST REPORT: Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.
Posted: 12 Sep 2019 | Published: 31 Aug 2019

Proofpoint

Trend Report: Threats are Multiplying and Becoming More Sophisticated
sponsored by Cisco Umbrella
ANALYST REPORT: Despite all the buzz about security and staying prepared, malicious attackers are more audacious than ever. Download this research report to explore popular threats such as phishing, ransomware, cryptomining and more. Also, learn how Cisco Umbrella can help keep your organization secure as threat risks continue to escalate.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

Proofpoint Email Isolation
sponsored by Proofpoint
PRODUCT OVERVIEW: It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Proofpoint

Armorblox NLU Platform
sponsored by Armorblox
PRODUCT OVERVIEW: Using natural language understanding (NLU), deep learning, analytics, automation, and distributed remediation, Armorblox can help defend your organization against business email compromise attacks, prevent data leaks, and inject integrity into your business workflows. In this solution brief, explore key features of the Armorblox NLU Platform.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019

Proofpoint

Defend Yourself with Risk-Based Vulnerability Management
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Arctic Wolf Networks, Inc.

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Mimecast Cyber Resilience For Email
sponsored by Mimecast
WEBCAST: Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

2019 Special Phishing Report
sponsored by Inky Technology
ANALYST REPORT: Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.
Posted: 16 Jul 2019 | Published: 16 Jul 2019

Inky Technology

Planning for Office 365 Gaps
sponsored by Mimecast
WHITE PAPER: Although Office 365 is widely used, easy to use and has built in security features, it has resilient gaps in terms of security, data retention and email continuity. In this white paper, learn how to protect your organization by implementing a cyber-resilience strategy for Office 365.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Mimecast

Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER: Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019

Proofpoint

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Reduce the Risk of Phishing Attacks on Your Company
sponsored by Inky Technology
RESOURCE: Every employee with an email address within your organization is a risk to your business. How those employees react to a phishing attempt can be critical to the success or destruction of your business. In this blog, learn how INKY Phish Fence can help reduce the risk of phishing attacks on your company.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Inky Technology

Why Training Is Not Enough to Stop Phishing Emails
sponsored by Inky Technology
RESOURCE: According to the FBI, phishing-based email accounted for more than $12 billion in fraud in just the last 5 years. In this blog, learn how Inky Phish Fence can help your organization prevent phishing attacks by scanning every internal and external email.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Inky Technology
1 - 25 of 99 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement