IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

e-Mail Security Policies

RSS Feed   
e-Mail Security Policies Reports
 
The State of Email Security 2020
sponsored by Mimecast
EGUIDE: The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Mimecast

Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

e-book: Securing Microsoft 365 Email Against Advanced Threats
sponsored by Cisco
EBOOK: Businesses are migrating to cloud email platforms for improved productivity, mobility, and continual access to the latest tools and features. But there’s a catch. Cloud-based email has left users and devices open to new threats and vulnerabilities. Read this e-book to explore these risks, particularly in the context of Microsoft 365.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Taking the Mystery Out of Protecting Your Office 365 Data
sponsored by arcserve
RESOURCE: Microsoft Office 365 lets you work anywhere, anytime with on-premises and cloud SaaS, IaaS and PaaS-based solutions. But while Microsoft takes care of the infrastructure for these services, it’s up to you to take care of your data. Scope out this infographic to learn how you could achieve cloud-to-cloud protection for Office 365.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

arcserve

Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers
sponsored by F5 Networks
WEBCAST: DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.
Posted: 08 Sep 2020 | Premiered: Sep 4, 2020

F5 Networks

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

SearchSecurity.com

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences