IT Management  >   Systems Operations  >   Security  >  

Messaging Security

RSS Feed   
ALSO CALLED: Web Messaging Security, Internet Messaging Security, Secure Messaging, Enterprise Messaging Security, Electronic Messaging Security
DEFINITION: The optimization of security, spam prevention, and enforcement of privacy and regulation compliance across the enterprise messaging environment.
Messaging Security Reports
1 - 25 of 104 Matches Previous Page  |  Next Page
Managing Teams
sponsored by Insight
WEBCAST: In this webcast, Pat Finlayson and James Wilson demonstrate how to manage Microsoft Teams including how to create Teams, change settings, find Teams and more.
Posted: 13 Dec 2019 | Premiered: Dec 13, 2019

Insight

Threat Intelligence Report November 2019
sponsored by Mimecast
WHITE PAPER: Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.
Posted: 12 Dec 2019 | Published: 30 Nov 2019

Mimecast

Moorabool Shire Council Case Study
sponsored by Mimecast
CASE STUDY: In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Mimecast

Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Lookout

Endpoint Security Buyer’s Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Tanium

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Splunk

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
ANALYST REPORT: The financial services industry is one of the most sought-after targets for attackers. Staying aware of new attack trends is imperative for financial organizations to keep their systems and customers safe. In the 2019 State of the Internet: Security Financial Services Attack Economy Report, learn how to protect against emerging threats.
Posted: 17 Oct 2019 | Published: 31 Jul 2019

Akamai Technologies

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

The Human Factor 2019 Report
sponsored by Proofpoint
ANALYST REPORT: Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.
Posted: 12 Sep 2019 | Published: 31 Aug 2019

Proofpoint

Trend Report: Threats are Multiplying and Becoming More Sophisticated
sponsored by Cisco Umbrella
ANALYST REPORT: Despite all the buzz about security and staying prepared, malicious attackers are more audacious than ever. Download this research report to explore popular threats such as phishing, ransomware, cryptomining and more. Also, learn how Cisco Umbrella can help keep your organization secure as threat risks continue to escalate.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

Armorblox NLU Platform
sponsored by Armorblox
PRODUCT OVERVIEW: Using natural language understanding (NLU), deep learning, analytics, automation, and distributed remediation, Armorblox can help defend your organization against business email compromise attacks, prevent data leaks, and inject integrity into your business workflows. In this solution brief, explore key features of the Armorblox NLU Platform.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Defend Yourself with Risk-Based Vulnerability Management
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Arctic Wolf Networks, Inc.

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

Mimecast Cyber Resilience For Email
sponsored by Mimecast
WEBCAST: Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Titus Military Classification for NATO Security Compliance
sponsored by TITUS
PRODUCT OVERVIEW: In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.
Posted: 01 Aug 2019 | Published: 30 Jun 2019

TITUS

This is the #1 Threat to Your Digital Properties
sponsored by The Media Trust
WHITE PAPER: In the early days of the Web and e-commerce, CISOs could secure the web application code developed by internal teams. But now, the majority of a website's code relies on third-parties. In this white paper, learn what CISOs need to know in order to protect themselves and their digital properties from malicious third-party code.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

The Media Trust

Zero Trust Internet Is the Answer for 100% Email and Web Security
sponsored by Menlo Security
WHITE PAPER: Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.
Posted: 25 Jul 2019 | Published: 25 Jul 2019

Menlo Security

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

Deliver a Secure Digital Workspace with Next-Gen Remote Access Solutions
sponsored by Citrix
WHITE PAPER: Digital transformation is the rocket fuel that helps companies boost productivity, engage consumers, and empower their people. However, the new application infrastructure is also posing new workflow challenges and security risks. In this white paper, learn how a secure digital perimeter enables IT to combat these security risks.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

Citrix

2019 Special Phishing Report
sponsored by Inky Technology
ANALYST REPORT: Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.
Posted: 16 Jul 2019 | Published: 16 Jul 2019

Inky Technology

Malware: The Ubiquitous Menace
sponsored by The Media Trust
WHITE PAPER: Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

The Media Trust

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology
1 - 25 of 104 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement