> Technology > Security > Email Security

Email Security

Results 1 - 25 of 389Sort Results By: Published Date | Title | Company Name
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
application security, authentication, email security, high availability, identity management
    
Secunia
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs
    
WatchGuard Technologies
White Paper Published By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
White Paper Published By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : 
e-mail security, guide, clearswift, clearswift, anti spam
    
Clearswift
White Paper Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.
Tags : 
mimecast, cloud-based email management, email archiving, software-as-a-service, e-discovery
    
Mimecast
White Paper Published By: Mimecast     Published Date: Nov 10, 2010
Practical cost saving benefits of cloud-based email management.
Tags : 
mimecast, software as a service, saas, email spend datasheet, cloud-based email management
    
Mimecast
White Paper Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security
    
Panda Security
White Paper Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat
    
Blue Coat Systems
White Paper Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware
    
Cisco
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management
    
Citrix Systems, Inc.
White Paper Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management
    
C2C Systems, Inc.
White Paper Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud
    
Mimecast
White Paper Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets
    
Sigaba
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server
    
Juniper Networks
White Paper Published By: Dyn     Published Date: Sep 25, 2013
Read this white paper to learn the 5 ways to prepare your advertising infrastructure for disaster.
Tags : 
advertising network latency, technical problems, conversions, clicks, dyn
    
Dyn
White Paper Published By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : 
edgewave, web filter for enterprise, web security, email security, messaging security
    
EdgeWave
White Paper Published By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : 
eset, smb, antivirus software, malware, it professional
    
ESET, LLC.
White Paper Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment
    
SilverSky
White Paper Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity
    
Adobe
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : 
unified threat management, firewalls, utm, firewall solutions, security
    
Sophos
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.