IT Management  >   Systems Operations  >   Security  >  

Messaging Security

RSS Feed   
ALSO CALLED: Web Messaging Security, Internet Messaging Security, Secure Messaging, Enterprise Messaging Security, Electronic Messaging Security
DEFINITION: The optimization of security, spam prevention, and enforcement of privacy and regulation compliance across the enterprise messaging environment.
Messaging Security Reports
1 - 25 of 96 Matches Previous Page  |  Next Page
Are You Getting Phishing Attacks in Outlook?
sponsored by Inky Technology
RESOURCE: IT security and infrastructure personnel are seeing a high volume of phishing attacks made every day. This is why phishing alerts and anti-phishing software are so important. However, even if your organization uses phishing alerts in Outlook, they might not be solving the problem. In this blog, learn how INKY can solve your phishing attack problem.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology

Spear Phishing Attacks: The #1 Cyberthreat
sponsored by Inky Technology
RESOURCE: Spear phishing is the most popular email fraud and scam method used today. In this blog, learn how a spear phishing attack works and how organizations can prevent it.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology

Why, When & How to Implement Employee Monitoring
sponsored by Interfocus
WHITE PAPER: In today's interconnected business environment, organizations struggle with remaining open within a connected world and also protecting themselves from outside attacks. In this white paper, learn why understanding how, when and where your employees are using their devices and data can help you to protect your business and reputation.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Interfocus

What Is Phishing and What Are Top CISOs Doing About It?
sponsored by Inky Technology
RESOURCE: In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019

Proofpoint

Stopping Email Fraud
sponsored by Proofpoint
WHITE PAPER: Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 21 Jun 2019 | Published: 31 Jan 2018

Proofpoint

Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

SearchSecurity.com

Protecting People: A Quarterly Analysis of Highly Targeted Cyberattacks
sponsored by Proofpoint
RESEARCH CONTENT: Today's attackers can trick your workers into opening an unsafe attachment or clicking on a dubious web link. They can also impersonate your CEO and order your finance department to wire money. Download this quarterly analysis to discover who at your organization is being attacked and how you can help protect them from these threats.
Posted: 20 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement
sponsored by Ziften
WEBCAST: 38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Premiered: Jun 17, 2019

Ziften

5 Steps to Selecting an Enterprise Anti-Virus Replacement
sponsored by Ziften
WHITE PAPER: Selecting a replacement for your legacy enterprise antivirus software can be challenging however, there are frameworks to help you go about making the right selection. In this white paper, explore 5 steps to selecting an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

Ziften

Secure Your Office 365 Environment With Forcepoint
sponsored by Forcepoint
WEBCAST: Driving Office 365 adoption is an important goal. Yet few organizations have fully migrated due to concerns around security, compliance, and poor user experience. In this webcast, learn how Forcepoint's Office 365 platform can help you move past these barriers by providing the confidence you need to fully adopt the suite.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

Forcepoint

Phishing in the Age of SaaS
sponsored by SonicWall
WHITE PAPER: Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

SonicWall

How a Security Company Adopts Office 365
sponsored by Forcepoint
WEBCAST: Driving Office 365 adoption is an important goal yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. In this webcast, join Forcepoint's CIO and Chief Scientist as they share learnings, surprises and insights from their own migration.
Posted: 11 Jun 2019 | Premiered: Jun 11, 2019

Forcepoint

The State of Email Security Report 2019
sponsored by Mimecast
RESEARCH CONTENT: Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Mimecast

Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY: Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Episode 2: The Attack
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Proofpoint Essentials for Microsoft Office 365
sponsored by Proofpoint
PRODUCT OVERVIEW: Office 365 is Microsoft's cloud-based email and collaboration platform. But you may need more advanced security capabilities beyond what's available. In this solution brief, explore how Proofpoint Essentials for Office 365 can help protect your users from targeted email attacks.
Posted: 07 Jun 2019 | Published: 31 Dec 2018

Proofpoint

Are Your People Sharing Too Much Information?
sponsored by BT
RESOURCE: What is published on the internet may be there forever, and in the wrong hands this open source intelligence could be used against you. In this article, explore 3 steps organizations can take to help prevent sensitive company data form being unintentionally shared.
Posted: 07 Jun 2019 | Published: 31 May 2019

BT

Understanding Email Fraud
sponsored by Proofpoint
RESOURCE: Business Email Compromise (BEC) is one of today's greatest cyberthreats to an organization. These highly targeted attacks are exploiting people rather than technologies to steal money and valuable business information. In this infographic, explore key email fraud statistics from Proofpoint's research of 2,250 IT decision makers.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Proofpoint

Lincoln Memorial University Case Study
sponsored by Proofpoint
CASE STUDY: There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

The Golden State Warriors Case Study: Leading on the Court and in Social Media
sponsored by Proofpoint
CASE STUDY: As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Proofpoint

Royal Bank of Scotland Reduces Phishing Susceptibility
sponsored by Proofpoint
CASE STUDY: The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.
Posted: 05 Jun 2019 | Published: 28 Feb 2019

Proofpoint

2019 SonicWall Cyberthreat Report
sponsored by SonicWall
RESEARCH CONTENT: Even for organizations, businesses and governments, a cyberattack is personal. At its very core, they strip these establishments and employees of their identities, privacy, reputation and monetary assets. In SonicWall's 2019 SonicWall Cyber Threat Report, explore key advancements in the threat landscape.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

SonicWall

The Human Factor Report 2018
sponsored by Proofpoint
RESEARCH CONTENT: Over the last year, cybercriminals have increased their use of social engineering, scaling up people-centered threats. Whether they are broad-based or targeted the social engineering tactics used in these attacks work time and time again. In this research report, explore 5 recommendations to help protect your organization against these threats.
Posted: 04 Jun 2019 | Published: 31 Dec 2018

Proofpoint
1 - 25 of 96 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement