IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Security Policies

RSS Feed   
e-Mail Security Policies Reports
 
Ransomware Galore: The Four You Shouldn't Ignore
sponsored by Cisco Umbrella
WHITE PAPER: Ransomware is a growing issue that isn't going away anytime soon. Most organizations have already renewed their focus on data backup and recovery. But beyond that, do you know what your top defensive priorities should be? In this white paper, explore 4 things your organization must do to defend against ransomware.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.
Posted: 15 Aug 2017 | Published: 31 Jul 2017

Mimecast

Mimecast Mobile: The Experience Employees Want With the Control You Need
sponsored by Mimecast
DATA SHEET: Access to information from anywhere is critical to increasing employee's productivity. However, without the appropriate security and controls in place, this can increase your risk of a breach. In this data sheet, learn how Mimecast Mobile allows employees to securely access the information they need.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Sophos Email Security Appliances
sponsored by Sophos
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info