IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed   
E Mail Security Reports
 
Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

Proofpoint Email Isolation
sponsored by Proofpoint
PRODUCT OVERVIEW: It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Proofpoint

Taking A “Prevent and Protect” Approach to Insider Data Breaches
sponsored by Egress Software Technologies Inc
VIDEO: As cyberattacks become occur more frequently than ever, organizations need to ensure their security efforts are focused on protecting from both external & internal threats. In this video, join the CPO of Egress in an overview of how an email security strategy can enhance regulatory compliance, reduce costs & increase profitability.
Posted: 03 Feb 2020 | Premiered: 23 Oct 2019

Egress Software Technologies Inc

Webinar: BEC Attacks Are the Costliest Form of Phishing
sponsored by PhishLabs
WEBCAST: Business Email Compromise (BEC) attacks are quickly becoming the costliest and least detectible form of phishing attacks. They occur when a scammer impersonates a trusted individual to exploit relationships via email. So, what can your organization do to prevent these attacks? Watch this webinar to find out.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET: Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

How to Conquer Phishing? Beat the Clock
sponsored by Ironscales
WHITE PAPER: Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.
Posted: 13 Jan 2020 | Published: 30 Sep 2018

Ironscales

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info