IT Services  >   Content Management Services  >  

Virus Protection Services

RSS Feed   
Virus Protection Services Reports
 
The Moray Council Secures SharePoint Data with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Effectively Manage Permissions in Microsoft SharePoint 2010
sponsored by TITUS
WHITE PAPER: This white paper details security permissions of SharePoint. Read on to learn how you can apply security permissions  to sensitive content in SharePoint and further you understanding of fine grained permissions within SharePoint without affecting business operations.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Third-Party Security Controls Needed to Close Gaps in Native Email Security
sponsored by Armorblox
ANALYST REPORT: With the move to cloud-delivered email solutions and an expanding email threat landscape, email security is in a state of transformation and organizations are reconsidering their current email security controls. Tap into this ESG report to learn what 403 IT and security professionals have to say about their email security concerns.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Egress Email and File Protection is cream of the crop for Farm Credit Mid-America
sponsored by Egress Software Technologies Inc
CASE STUDY: Taking inspiration from the internal system security best practices used by financial organizations, this case study follows the journey of Farm Credit Mid-America as they partner with Egress to proactively establish an email and file security for ensuring the protection of sensitive data.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Egress Software Technologies Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info