ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Encryption Research

  • Dutch DIY Giant Shelves Email Attacks

    Sponsored by: Barracuda

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: SearchSecurity.com

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: SearchSecurity.com

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Expert ways to maximize security in Exchange

    Sponsored by: SearchDataCenter.com

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.

  • Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?

    Sponsored by: SearchSecurity.com

    With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.

  • How to Build an Enterprise Cybersecurity Plan

    Sponsored by: Fortinet, Inc.

    A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.

  • Can A Subscription Ease SSL Certificate Management?

    Sponsored by: Symantec Website Security

    This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.

  • Voltage Success Story: Envision Pharmaceutical Services

    Sponsored by: Voltage Security, Inc.

    This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.

  • Personally Identifiable Information (PII) and Personal Health Information (PHI)

    Sponsored by: Voltage Security, Inc.

    This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.

  • Microsoft Office 365: Strengthening Security, Compliance, and Control

    Sponsored by: Mimecast

    This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.

  • Policy Based Encryption: Protecting your Business Against Email Risks

    Sponsored by: Apptix

    This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption

    Sponsored by: WatchGuard Technologies, Inc.

    WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data.

  • Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution

    Sponsored by: Google

    Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.

  • The True Costs of E-mail Encryption

    Sponsored by: Trend Micro

    Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • ESG: Realizing and Maximizing E-mail Archiving ROI

    Sponsored by: EMC Corporation

    ESG research indicates that organizations with e-mail archive implementations experience several measurable benefits, including lower storage costs as well as more efficient compliance, electronic discovery, and data protection operations. This white paper discusses the benefits of evaluating solutions to achieve the statuses mentioned above.

  • Entrust Entelligence™ Messaging Server

    Sponsored by: Entrust, Inc.

    The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.