ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Services Research

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: SearchSecurity.com

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: SearchSecurity.com

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Maximizing Business Email Security in Gmail

    Sponsored by: SearchSecurity.com

    This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.

  • Market trends: The Future of E-mail

    Sponsored by: SearchSecurity.com

    Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.

  • Expert ways to maximize security in Exchange

    Sponsored by: SearchDataCenter.com

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.

  • Enterprise Email and Office 365 Security

    Sponsored by: Check Point Software Technologies Ltd.

    One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.

  • Secure Mobile Email for the Lean IT Department

    Sponsored by: Shavlik Technologies

    This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.

  • Cisco Email Security

    Sponsored by: Cisco

    This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.

  • Advanced Malware Protection for your Web and Email Gateways

    Sponsored by: Cisco Systems, Inc.

    This article explores the recent merger between one company's advanced malware protection and their web and email gateways.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

  • Advanced Malware Protection for your Email Services

    Sponsored by: Cisco Systems, Inc.

    This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.

  • Policy Based Encryption: Protecting your Business Against Email Risks

    Sponsored by: Apptix

    This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: Agari

    This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: Symantec Corporation

    Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.

  • Leveraging security from the Cloud

    Sponsored by: IBM

    Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.

  • Fortune 200 Firm Achieves Global Email Protection

    Sponsored by: WatchGuard Technologies, Inc.

    Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.

  • Trend Micro Hosted Email Security

    Sponsored by: Trend Micro

    Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.

  • Trend Micro Hosted Email Security

    Sponsored by: Trend Micro

    Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.

  • Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam

    Sponsored by: Panda Security

    Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.