IT Management  >   Systems Operations  >   Security  >  

Enterprise Messaging Security

RSS Feed   
Enterprise Messaging Security Reports
 
Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Email Risk Assessment Report
sponsored by 365iTMS
ANALYST REPORT: Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

365iTMS

Ransomware Galore: The Four You Shouldn't Ignore
sponsored by Cisco Umbrella
WHITE PAPER: Ransomware is a growing issue that isn't going away anytime soon. Most organizations have already renewed their focus on data backup and recovery. But beyond that, do you know what your top defensive priorities should be? In this white paper, explore 4 things your organization must do to defend against ransomware.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Managing Integrated Communications, Consumerization and Security: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

SearchSecurity.com

Exchange Insider E-zine Volume 8: Prepping BlackBerry Enterprise Server for Exchange 2010 SP1
sponsored by SearchWindowsServer.com
EZINE: Volume 8 of the Exchange Insider e-zine compares available Blackberry Enterprise Server (BES) editions and then gives instructions for deploying BES Express for Exchange 2010. You’ll also get an overview of configuring Exchange Server 2010 for BES and some device management best practices to make sure all your clients remain in peak condition.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

SearchWindowsServer.com

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

Email Management in Today's Regulatory Environment
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem..
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

SearchSecurity.com

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences