ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Policies Research

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: TechTarget Security

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Maximizing Business Email Security in Gmail

    Sponsored by: TechTarget Security

    This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.

  • Exchange Server: E-mail Archiving and Security

    Sponsored by: TechTarget Security

    Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: Kaspersky

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Mobile Configuration Management Functions for Successful MDM

    Sponsored by: Citrix Systems, Inc.

    This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.

  • Secure File Transfer Tech Guide

    Sponsored by: TechTarget Security

    Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.

  • Reducing Archiving Costs by Implementing Email Labelling Technology

    Sponsored by: Boldon James

    This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.

  • 10 Steps to Email Security

    Sponsored by: Clearswift

    This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.

  • Information Governance Perspectives from RSD: E-mail Archiving

    Sponsored by: RSD

    With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions

  • eBook-- Defining an Email-Archiving Policy

    Sponsored by: Symantec Corporation

    Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

  • Secure Enterprise e-mail Solutions with Microsoft® Exchange

    Sponsored by: OnX USA LLC

    This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.

  • A Guide to Evaluating Email Security Solutions

    Sponsored by: SonicWALL

    E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.

  • Archiving Lotus Domino for Storage Optimization and E-Discovery

    Sponsored by: Symantec Corporation

    Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.

  • Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper

    Sponsored by: Symantec Corporation

    This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.

  • Advantages of Integrated Messaging Security

    Sponsored by: Symantec Corporation

    This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...

  • Symantec Mail Security for SMTP 5.0

    Sponsored by: Symantec Corporation

    This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...

  • Symantec Mail Security for SMTP

    Sponsored by: Symantec Corporation

    Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.

  • Sophos Email Security Appliances

    Sponsored by: Sophos

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.