IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

e-Mail Decryption

RSS Feed   
e-Mail Decryption Reports
How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Expert ways to maximize security in Exchange
sponsored by
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

Improving Enterprise Email Security: Systems and Tips
sponsored by
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec
sponsored by Symantec Corporation
WHITE PAPER: By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Symantec Corporation

Removing the Risks and Complexities of Business Email Management
sponsored by Iron Mountain
DATA SHEET: Email is central to all organizations and has become the most essential business application of all. As a result, the ability to continuously protect, store, manage and archive great volumes of email is now a key business issue; Iron Mountain's Total Email Management Suite is the answer.
Posted: 07 Jun 2013 | Published: 03 Jun 2009

Iron Mountain

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems

ESG: Realizing and Maximizing E-mail Archiving ROI
sponsored by EMC Corporation
WHITE PAPER: ESG research indicates that organizations with e-mail archive implementations experience several measurable benefits, including lower storage costs as well as more efficient compliance, electronic discovery, and data protection operations. This white paper discusses the benefits of evaluating solutions to achieve the statuses mentioned above.
Posted: 23 Apr 2009 | Published: 23 Apr 2009

EMC Corporation

When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption
sponsored by WatchGuard Technologies, Inc.
TECHNICAL ARTICLE: WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER: Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

Trend Micro

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement