IT Management  >   Systems Operations  >   Security  >  

Messaging Security

RSS Feed   
ALSO CALLED: Web Messaging Security, Internet Messaging Security, Secure Messaging, Enterprise Messaging Security, Electronic Messaging Security
DEFINITION: The optimization of security, spam prevention, and enforcement of privacy and regulation compliance across the enterprise messaging environment.
Messaging Security Reports
1 - 25 of 53 Matches Previous Page  |  Next Page
Put connection at the center of care
sponsored by RingCentral
WHITE PAPER: Many healthcare organizations use technology that ends up holding them back—increasing care complexity, limiting collaboration, and reducing doctor effectiveness. Check out this white paper to learn how a cloud-based collaboration solution is helping healthcare leaders overcome these challenges, all while keeping data secure and compliant.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

RingCentral

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Top 9 DDOS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Radware

Core - DNS - Secure Everywhere: The power of integrated internet, endpoint, and email security
sponsored by Cisco Umbrella
RESOURCE: Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Text Messages & Social Media in Public Safety
sponsored by Smarsh
WHITE PAPER: The popularity of text messaging and social media has exploded in recent years, including in the workplace. In this white paper, examine how public safety agencies can create policies that allow for compliant use of text messaging and social media, and how to retain those communications for an efficient response to open records requests.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Managing Integrated Communications, Consumerization and Security: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

SearchSecurity.com

Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

SearchSecurity.com

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR

Citrix ShareFile updates let businesses ditch paper processes
sponsored by Citrix
EGUIDE: Enterprise file sync-and-share (EFSS) platforms have seen widespread use in recent years. EFSS services have been optimizing features to help businesses more efficiently streamline workflows. In this e-guide learn about new features one platform has added and how they can help your organization digitize processes that are often paper-based.
Posted: 12 Dec 2016 | Published: 08 Dec 2016

Citrix

Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia Net

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

Beaufort Memorial Case Study
sponsored by Imprivata
WHITE PAPER: This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Best Practices for Secure Email Policy and Compliance
sponsored by Axway
WHITE PAPER: Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Axway

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

Domino Security Vulnerabilities to Watch For
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

Exchange Insider E-zine Volume 8: Prepping BlackBerry Enterprise Server for Exchange 2010 SP1
sponsored by SearchWindowsServer.com
EZINE: Volume 8 of the Exchange Insider e-zine compares available Blackberry Enterprise Server (BES) editions and then gives instructions for deploying BES Express for Exchange 2010. You’ll also get an overview of configuring Exchange Server 2010 for BES and some device management best practices to make sure all your clients remain in peak condition.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

SearchWindowsServer.com

Exchange Insider E-zine -- Volume 7: Five Things to Do Before Virtualizing Exchange Server 2010
sponsored by SearchWindowsServer.com
EZINE: This issue demonstrates how to change default Outlook Web App settings and why you shouldn’t skip the tedious process of documenting a server migration project. Also learn the five critical elements you'll need to have in place before you plug in your first virtual machine.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

SearchWindowsServer.com

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Should Your Email Live In The Cloud? A Comparative Cost Analysis
sponsored by Google
ANALYST REPORT: This analyst report presents a spreadsheet cost model to help you calculate your fully loaded on premise email costs and compare it against cloud-based alternatives.
Posted: 18 Oct 2010 | Published: 05 Jan 2009

Google
1 - 25 of 53 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences