IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed   
E Mail Security Reports
 
Lincoln Memorial University Case Study
sponsored by Proofpoint
CASE STUDY: There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

Email Security Risk Assessment for Microsoft Office 365
sponsored by Mimecast
RESOURCE: View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Mimecast

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

Mimecast Web Security
sponsored by Mimecast
PRODUCT OVERVIEW: In this solution brief, discover how Mimecast Web Security can help protect against malicious web activity initiated by user action or malware and block business inappropriate websites.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Whitepaper: Does Office 365 Deliver the Email Security and Resilience Enterprises Need?
sponsored by Mimecast
WHITE PAPER: In this white paper, learn about the native security features Office 365 delivers, as well as how to extend them for the added resilience you need to keep your communications safe.
Posted: 26 Aug 2019 | Published: 12 Jun 2019

Mimecast

End User Applications Datasheet
sponsored by Mimecast
DATA SHEET: Email is a core business application and remains the number one form of business communication. Mimecast's apps play a key role in delivering the email experience employees expect and supporting IT in safeguarding the enterprise. Download this data sheet to learn about the key benefits of Mimecast's suite of productivity apps today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Best Practices Award: Email Security Global
sponsored by Mimecast
WHITE PAPER: The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Mimecast

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement