> Technology > Security > Email Security

Email Security

Results 51 - 75 of 389Sort Results By: Published Date | Title | Company Name
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : 
kaspersky, cybersecurity, cyberattack, hackers, it security
    
Kaspersky
White Paper Published By: Box     Published Date: Nov 09, 2014
Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.
Tags : 
box, file sharing, ecm, enterprise content management, cloud file sharing
    
Box
White Paper Published By: Symantec     Published Date: Oct 20, 2014
In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.
Tags : 
symantec, data protection, backup and recovery, disaster recovery, data center
    
Symantec
White Paper Published By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : 
apts, understanding apts, apt security strategy, stages of advanced threats, anti spam
    
Websense
White Paper Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
access control, anti spam, anti spyware, anti virus, application security
    
Thawte
White Paper Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website.
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware
    
Symantec
Free Offer Published By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : 
network security, application security, compliance, email security, hacker detection
    
Citrix
Free Offer Published By: Lancope     Published Date: Jun 21, 2014
Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.
Tags : 
lancope, cyberattack, cyber criminals, network security, hackers
    
Lancope
White Paper Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers
    
Palo Alto Networks
White Paper Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack
    
Palo Alto Networks
White Paper Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network, internet security
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2014
A Cisco white paper on mitigating email virus attacks
Tags : 
email security, cisco, email virus, security, inbound and outbound risks
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, internet security, intrusion detection
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2014
A Cisco white paper on mitigating email virus attacks
Tags : 
email security, cisco, email virus, security, inbound and outbound risks
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2014
Solution At-A-Glance eBook on Cisco Web Security
Tags : 
access control, anti spam, anti spyware, anti virus, email security
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 12, 2014
U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.
Tags : 
cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 12, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network, internet security
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 12, 2014
A Cisco white paper on mitigating email virus attacks
Tags : 
email security, cisco, email virus, security, inbound and outbound risks
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 12, 2014
Solution At-A-Glance eBook on Cisco Web Security
Tags : 
cisco web security, malware, high risk sites, anti spam, anti spyware
    
Cisco
Free Offer Published By: McAfee     Published Date: May 22, 2014
FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.
Tags : 
security, software, network security, evasion technique, aet testing environment
    
McAfee
White Paper Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers
    
Kaspersky
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.