Research Library

Powered by

Email Security Software Research

  • Creative Lodging Solutions

    Sponsored by: Absolute Software Corporation

    In this case study, discover how Creative Lodging Solutions (CLS), a travel management company, partnered with Absolute to establish control and visibility of their endpoints to eliminate blind sports and protect intellectual property.

  • Best Practices for Enterprise Phishing Protection

    Sponsored by: PhishLabs

    According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.

  • Securing the Human Layer

    Sponsored by: Armorblox

    While the advancement of technology has enabled organizations to enhance their productivity, it also exposes networks and users to security risks. This whitepaper highlights the flaws of modern security tactics and explores how incorporating AI is can safeguard the most crucial part of an organization – its people.

  • Product Overview

    Sponsored by: Armorblox

    In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.

  • Webinar: Proactively Protect Users with Email Incident Response

    Sponsored by: PhishLabs

    Phishing attacks are growing in their frequency, and the damage caused by these campaigns is increasingly costly. It’s more critical than ever for security leaders to reconsider how they approach phishing detection. In this webinar, discover the key characteristics of an effective program and view a demo of PhishLabs’ Email Incident Response.

  • The Email Incident Response Playbook

    Sponsored by: PhishLabs

    Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.

  • How to Handle Phishing Threats That Bypass Email Security Technology

    Sponsored by: PhishLabs

    The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.

  • What secure email gateways can do for your enterprise

    Sponsored by:

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • SIG - More Organizations are Using a Secure Internet Gateway for Secure Access

    Sponsored by: Cisco Umbrella

    What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.

  • Email security: Never more important

    Sponsored by:

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • How Phishing Security Software is Different from Email Security Software

    Sponsored by: Inky Technology

    All legacy email security apps on the market have value and are useful within the space that they operate. However, there are many differences between traditional email security software and anti-phishing software platforms. Read on to learn more.

  • Proofpoint Advanced Email Protection: Analyst Report

    Sponsored by: Proofpoint

    As companies continue to rely on email as their primary communication channel, the need for email security becomes a critical priority. According to Forrester, as many as 94% of attacks start with email. In this report, take a closer look at the results of Forrester’s research into the benefits and costs of email security programs.

  • CCPA compliance guide for email

    Sponsored by: Egress Software Technologies Inc

    2020 marks the initiation of the United States’ first data privacy law – the CCPA. How has your organization prepared? Download this white paper to uncover the 3-phase approach to compliance and recommended tactics related to email security & file sharing.

  • Egress Email and File Protection is cream of the crop for Farm Credit Mid-America

    Sponsored by: Egress Software Technologies Inc

    Taking inspiration from the internal system security best practices used by financial organizations, this case study follows the journey of Farm Credit Mid-America as they partner with Egress to proactively establish an email and file security for ensuring the protection of sensitive data.

  • SEG Campaign Accountability Ebook

    Sponsored by: Area 1 Security

    Phishing attacks are on the rise, and current defense methods are ineffective at identifying and mitigating a malicious email. In this e-book, take a closer look at the faults in current security and discover Area 1’s approach to accountable phishing protection.

  • Your Email Security is Ineffective, and Getting Worse

    Sponsored by: Ironscales

    The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.

  • Business Email Compromise: The Catalyst for Mailbox Level Email Security

    Sponsored by: Ironscales

    As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.

  • Why Secure Email Gateways Fail to Catch Phish

    Sponsored by: Area 1 Security

    Phishing attacks are becoming difficult for secure email gateways (SEGs) to detect and mitigate, leading to resource-intensive remediation efforts. But why are SEGs failing? This e-book goes in-depth into why SEGs are ineffective at catching phishing attacks and explores what you can do to improve your email security.

  • When the Cloud Rains Phish

    Sponsored by: Area 1 Security

    When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.

  • Dutch DIY Giant Shelves Email Attacks

    Sponsored by: Barracuda

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Special Report: 2019 Email Security Trends

    Sponsored by: Barracuda

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • Is Microsoft O365 Good Enough Protection & Recovery Webinar?

    Sponsored by: Mimecast

    Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.

  • Email security: Never more important

    Sponsored by:

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.