ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Research

  • Symantec Web Security Service: Advanced Cloud-Delivered Network Security for the Cloud Generation

    Sponsored by: Symantec

    Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.

  • Office 365: 5 Things to Ask Yourself Before Migrating

    Sponsored by: Symantec

    Although the cloud has been a game changer for IT, allowing organizations to quickly and cost-effectively adopt apps and services like Office 365, it also brings with it a new set of security challenges. In this resource, explore 5 questions you should ask when migrating to cloud services like Office 365.

  • Office 365 Business Case Builder

    Sponsored by: Symantec

    Office 365 is a broad and diverse platform that can present a complex security risk. In this resource, discover a 6-point business case builder to demonstrate how Symantec CloudSOC and Email Security.cloud can help provide protection for not just Office 365 but your wider cloud environment.

  • CloudSOC and Email Security.cloud for Microsoft Office 365

    Sponsored by: Symantec

    Email is the #1 attack vector with 71% of targeted attacks coming from spear phishing emails, according to the 2018 Symantec Internet Security Threat Report. In this solution brief, learn how Symantec CloudSOC CASB and Email Security.cloud for Office 365 can help you secure your email and apps against threats.

  • Who will win the world's biggest cloud contract?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • The US Department of Homeland Security's Best Practices for Office 365 Security

    Sponsored by: Zoho

    As more organizations adopt Office 365, it's important to know the risks involved in this transition. In this report, The Cybersecurity and Infrastructure Security Agency (CISA) discusses the cloud services configuration vulnerabilities found in surveyed organizations. The report also recommends steps to mitigate these risks and vulnerabilities.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Proofpoint

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • How to Keep up with the Shifting Landscape of Password Attacks

    Sponsored by: Zoho

    Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.

  • Financial Services Attack Economy

    Sponsored by: Akamai

    There's no one organization that can detect and track all aspects of the attacks we face today. But combining intelligence from different types of attack data with broad experience allows talented analysts to understand the attacks they do see. In this research report, explore attacks against the financial services industry.

  • The Complete Guide to G Suite Email Protection for IT and Security Leaders

    Sponsored by: Virtru

    A mistaken reply all or forward can cost millions. And for executives with more sensitive and valuable information stored in their inboxes, the stakes are even higher.This guide explains the strategic drivers around the need for email encryption and outlines the best available options for organizations that use G Suite. Read on to learn more.

  • Defend Yourself with Risk-Based Vulnerability Management

    Sponsored by: Arctic Wolf Networks, Inc.

    In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.

  • Supplementing the Limitations in Office 365

    Sponsored by: Forcepoint

    This Osterman Research report explores how you can use the native capabilities Office 365 provides as a starting point for your data protection strategy, and how you can implement a 3rd party service to help ensure all of your data is backed-up and recoverable.

  • Conversational Geek Office 365 Risk Mitigation

    Sponsored by: Mimecast

    If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.

  • 10 Questions to Ask About Your Office 365 Deployment

    Sponsored by: Mimecast

    Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.

  • Is Microsoft O365 Good Enough Protection & Recovery Webinar?

    Sponsored by: Mimecast

    Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.

  • Mimecast Cyber Resilience For Email

    Sponsored by: Mimecast

    Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.

  • Titus Military Classification for NATO Security Compliance

    Sponsored by: TITUS

    In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.

  • Email security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • This is the #1 Threat to Your Digital Properties

    Sponsored by: The Media Trust

    In the early days of the Web and e-commerce, CISOs could secure the web application code developed by internal teams. But now, the majority of a website's code relies on third-parties. In this white paper, learn what CISOs need to know in order to protect themselves and their digital properties from malicious third-party code.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Beyond The Phish: 2019 Report

    Sponsored by: Proofpoint

    In Proofpoint's 2019 Beyond the Phish report, explore user knowledge of a broad range of best practices for cyberhygiene, security and compliance. The report analyses millions of responses gathered from their Security Education Platform.

  • 2019 Special Phishing Report

    Sponsored by: Inky Technology

    Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.

  • Planning for Office 365 Gaps

    Sponsored by: Mimecast

    Although Office 365 is widely used, easy to use and has built in security features, it has resilient gaps in terms of security, data retention and email continuity. In this white paper, learn how to protect your organization by implementing a cyber-resilience strategy for Office 365.

  • Malware: The Ubiquitous Menace

    Sponsored by: The Media Trust

    Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.