> Technology > Security > Email Security

Email Security

Results 226 - 250 of 389Sort Results By: Published Date | Title | Company Name
White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking
    
Proofpoint
White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.
Tags : 
proofpoint mlx, spam detection, email security, phishing attack, saas
    
Proofpoint
White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp
    
Proofpoint
White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management
    
Proofpoint
White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.
Tags : 
proofpoint, enterprise data protection, email encryption, security, data loss prevention
    
Proofpoint
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs
    
WatchGuard Technologies
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email
Tags : 
messagelabs symantec hosted services, email, security, botnets, anti virus
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email, web, and IM secure is a complex and daunting task. Learn how a hosted solution can provide security and available communications.
Tags : 
messagelabs symantec hosted services, email, security, web security, email security
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets
    
Symantec.cloud
White Paper Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus
    
Trend Micro SPN
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.
Tags : 
webroot, saas, software-as-a-service, web security, email security
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
Service Subscription Takes the Headache Out of Email and Web Threat Management. Read this white paper about the Seven Reasons to Adopt SaaS Security.
Tags : 
webroot, security saas, web security, email security, security management
    
Webroot UK
White Paper Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats
    
McAfee Inc
White Paper Published By: IBM     Published Date: Oct 23, 2009
The e-kit, "Collaboration solutions for a more flexible work environment," includes white papers, webcasts, a demo and more.
Tags : 
productivity, ibm, security, email, business applications platform
    
IBM
White Paper Published By: Iovation     Published Date: Sep 25, 2009
One of the world's largest MMORPG publishers uses iovation to keep their games safe for their valued players, and the fraudsters out.
Tags : 
iovation, mmorpg, reputationmanager, online game development and publishing, trickster online revolution
    
Iovation
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.