Business of Information Technology  >   Business Management  >   Content Management  >  

e-Mail Content Security Management

RSS Feed   
e-Mail Content Security Management Reports
 
6 Elements of Effective Compliance Training: What Moves the Needle
sponsored by Skillsoft
WHITE PAPER: The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

Ten Strategies of a World-Class Security Operations Center
sponsored by Corelight
WEBCAST: The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018

Corelight

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

The Benefits of a Software Defined Secure Branch with Versa Networks
sponsored by Verizon
WHITE PAPER: Adopting software defined secure branch gives organizations a network landscape that is built for the digital enterprises of today. In this white paper, discover the benefits of a software defined secure branch with Versa Networks.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Verizon

Today's State of Vulnerability Response: Patch Work Demands Attention
sponsored by ServiceNow
RESEARCH CONTENT: As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

ServiceNow

Empowering Big Data in a Data-driven Economy
sponsored by Comforte AG
WHITE PAPER: Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Comforte AG

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Published: 14 May 2007

Symantec Corporation

Secure Web Gateway Overview: Implementation Best Practices
sponsored by Sophos
EGUIDE: This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Sophos

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement