> Technology > Security > Email Security

Email Security

Results 1 - 25 of 389Sort Results By:Published Date | Title | Company Name
White Paper Published By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : 
iboss, remote access, byod, cybersecurity, mobile workforce
    
iboss
White Paper Published By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : 
rsa, rsa security, data breach, data protection, gdpr
    
RSA
White Paper Published By: Kaspersky     Published Date: Feb 06, 2017
Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.
Tags : 
kaspersky, cyber crime, data loss, business security, network security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection
    
Kaspersky
White Paper Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware
    
Cisco
White Paper Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers
    
Kaspersky
White Paper Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups, anti spyware
    
Code42
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.
Tags : 
citrix, mobile, . mdm, secure, file sharing
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.
Tags : 
citrix, sharefile, enterprise, security, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.
Tags : 
citrix, security, remote access, delivery, infrastructure
    
Citrix Systems, Inc.
Case Study Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security
    
Entrust Datacard
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : 
unified threat management, firewalls, utm, firewall solutions, security
    
Sophos
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
endpoint buyers, vendors, endpoint security solution, antivirus, security solutions
    
Sophos
White Paper Published By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : 
silanis, esignlive, electronic signature, regulatory compliance, compliance
    
Silanis
White Paper Published By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : 
kaspersky, attacks, cyberattacks, business process, security costs
    
Kaspersky
Webinar Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats
    
AlienVault
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection
    
Venafi
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions
    
IBM
White Paper Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.