IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed   
Secure Email Reports
 
The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: 95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

How Huisman Used Forcepoint Email and Web Security Cloud to Reduce Risk
sponsored by Forcepoint
CASE STUDY: Find out how Huisman, a globally operating company specializing in engineering and manufacturing, reduced risk with Forcepoint's cloud solution for email and web security.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Forcepoint

Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
RESOURCE: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

Threat Intelligence Report
sponsored by F5 Networks
RESOURCE: How do you safeguard your employees from becoming phishing bait? In this report, learn why phishing campaigns work so well, how unsuspecting users play into the hands of attackers, and what your organization can do to avoid them.
Posted: 30 Nov 2018 | Published: 31 Dec 2017

F5 Networks

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Shore Up Your Office 365 Attack Surface
sponsored by Proofpoint, Inc.
EBOOK: This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

Proofpoint, Inc.

Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD
sponsored by ZixCorp
WHITE PAPER: This expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

ZixCorp
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement