ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Software Research

  • Email security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Creating and Enforcing Email Security Policies

    Sponsored by: TechTarget Security

    This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: TechTarget Security

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Email is your go-to comms tool, so don't scrimp on securing it

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.

  • 12 Essential Features of Advanced Endpoint Security Tools

    Sponsored by: Claranet

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.

  • What secure email gateways can do for your enterprise

    Sponsored by: TechTarget Security

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • Email Security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Enterprise Email and Office 365 Security

    Sponsored by: Check Point Software Technologies Ltd.

    One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.

  • Microsoft Office 365: Strengthening Security, Compliance, and Control

    Sponsored by: Mimecast

    This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.

  • Consultants: How Can You Secure Your Information with Customers?

    Sponsored by: Globalscape

    This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.

  • Cisco Email Security

    Sponsored by: Cisco

    This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.

  • Advanced Malware Protection for your Web and Email Gateways

    Sponsored by: Cisco Systems, Inc.

    This article explores the recent merger between one company's advanced malware protection and their web and email gateways.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

  • Advanced Malware Protection for your Email Services

    Sponsored by: Cisco Systems, Inc.

    This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Best Practices for Secure Email Policy and Compliance

    Sponsored by: Axway

    Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.

  • Top 10 Steps to Ensure a Successful Migration to Exchange 2013

    Sponsored by: Dell Software

    Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>

  • 10 Steps to Email Security

    Sponsored by: Clearswift

    This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.

  • Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam

    Sponsored by: Panda Security

    Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • Great Things Happen on the Road to Disaster Recovery

    Sponsored by: AppAssure Software, Inc.

    In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.

  • Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses

    Sponsored by: Cisco Systems, Inc.

    Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.

  • What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange

    Sponsored by: BlackBerry

    View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.

  • Secure Enterprise e-mail Solutions with Microsoft® Exchange

    Sponsored by: OnX USA LLC

    This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.