IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Security Policies

RSS Feed   
e-Mail Security Policies Reports
 
Cisco Video Demo: Cisco Cloud Mailbox Defense
sponsored by Cisco
VIDEO: Organizations looking for a more effective security strategy against email threats need an up-close view of value. Cloud email tends to be vulnerable, and so it’s important to understand what technologies are available to defend it. View this demonstration of Cisco Cloud Mailbox Defense.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cisco

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Protecting Your Business from Cyberthreats in 2020
sponsored by Barracuda
EBOOK: Modern hackers have taken traditional methods of cyberattack and altered them to become more precise, more aggressive, and more dangerous. The FBI reported that business email compromise attacks cost organizations $26 billion in the past three years, and this number may be due to increase. Learn more about evolving threats in this e-book.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Barracuda

Clearedin Office 365, Exchange Online Protection (EOP) and Secure Email Gateway (SEG) Solution
sponsored by Clearedin
WHITE PAPER: Office 365 (O365) applications are used by many in the rapidly expanding remote workforce. However, while these apps have native anti-phishing measures in place, you may need additional layers of protection to prepare for more sophisticated threats. Click here to learn how to properly supplement your O365 security.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia Net
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info