Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >  

e-Mail Decryption Software

RSS Feed   
e-Mail Decryption Software Reports
 
Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Don't Invite Bad Code In
sponsored by Veracode, Inc.
WHITE PAPER: Download this white paper to discover a software composition analysis technology that checks your third-party code at the same time you're scanning your own code, giving you complete visibility into your applications' security, in a single report.
Posted: 02 May 2018 | Published: 02 May 2018

Veracode, Inc.

IBM i Encryption: How to Protect Your Database
sponsored by HelpSystems
WHITE PAPER: Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

HelpSystems

CW Nordics ezine February 2018
sponsored by ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

ComputerWeekly.com

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

Cisco Umbrella

Don't Confuse Low-Code with No-Code
sponsored by OutSystems
WHITE PAPER: Explore the differences between low-code vs. no-code, with a particular focus on the users these tools are designed for and what they're designed to help these users do. Learn how to properly outfit your development projects with low-code and no-code tools so you can enable rapid development for cloud and mobile.
Posted: 27 Sep 2018 | Published: 27 Sep 2018

OutSystems

How Logitech Used a Low-code Platform to Replace Thousands of Lotus Notes-Based Apps
sponsored by OutSystems
CASE STUDY: In this e-book, find out how Logitech adopted a low-code development platform to replace legacy, difficult-to-deploy apps based on Lotus Notes.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

OutSystems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement