ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Research

  • IT Decision Checklist: Messaging Security

    Sponsored by: TechTarget Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Sponsored by: TechTarget Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • EMC SourceOne for Microsoft Exchange Server 2010

    Sponsored by: EMC Corporation

    Microsoft and EMC provide compelling new capabilities for managing your Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements.

  • Trend Micro Hosted Email Security

    Sponsored by: Trend Micro

    Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.

  • Trend Micro Hosted Email Security

    Sponsored by: Trend Micro

    Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.

  • Cloud Computing: Best Practices for Migrating to Microsoft Business Productivity Online Suite

    Sponsored by: Dell Software

    In this new white paper by Quest Software, learn the best practices for migrating to Microsoft Exchange Online and SharePoint Online from any legacy platform. See why organizations like yours are moving to BPOS. Read this white paper today.

  • Presentation Transcript: Showdown in New Mexico, Google Apps vs. Microsoft Exchange

    Sponsored by: Google Apps

    Read this presentation transcript featuring James Ferreira, CIO for the New Mexico State Attorney General's Office, to learn about migrating to cloud computing applications.

  • Presentation Transcript: Exchange 2010 Roadmap Series - Backup and Recovery

    Sponsored by: Dell, Inc. and Intel®

    In this presentation transcript, featuring Exchange pro, Lee Benjamin, you'll learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls.

  • Key Considerations for Migrating to Exchange 2010

    Sponsored by: EMC Corporation

    This white paper addresses the key issues that decision makers should consider as they plan their Exchange 2010 migration. It discusses the results of an in-depth primary research survey conducted by Osterman Research that explores how decision makers are planning their migration to Exchange 2010.

  • Supercharging exchange with solid state without breaking the bank

    Sponsored by: Fusion-IO

    This presentation transcript on Exchange is exciting because Exchange is so expansive in so many different organizations across the world itself. We will talk about the opportunities for Exchange, what we see in terms of the broad market place and how Exchange appointments are going to increase over time.

  • Presentation Transcript: Considerations for IT

    Sponsored by: Google Apps

    Read this transcript of the 'Considerations for IT' podcast to learn why companies have chosen Google Apps to improve their IT infrastructures. Learn which technical and business factors drove one company to adopt this technology. Determine how this technology can be used in your IT environment to improve Web application performance.

  • Presentation Transcript: Legal Discovery and Your Messaging Environments - What's Important and Why!

    Sponsored by: Daegis

    In this presentation transcript, learn how Lotus Notes Administrators play an important role in legal discovery. Find out how archiving systems can help meet compliance standards and gain an understanding of business requirements around e-discovery. Discover how to make sure your company’s information is properly archived.

  • Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam

    Sponsored by: Panda Security

    Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.

  • Panda’s Managed Email Protection Service

    Sponsored by: Panda Security

    This data sheet provides information on Panda's Managed Email Protection Service, a managed email cleaning service guaranteeing 100% malware-free email, as well a series of key features of a great value to any company.

  • Email Archiving Purchasing Considerations

    Sponsored by: Iron Mountain

    This E-Guide will highlight the archiving options that prove to be beneficial to storage pros today, as well as the best practices to be put to use when implementing email and file archiving products.

  • Information Security Magazine - September 2009: Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

  • Authentication in the Enterprise: Current and Changing Requirements

    Sponsored by: PistolStar, Inc.

    This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • eBook-- Defining an Email-Archiving Policy

    Sponsored by: Symantec Corporation

    Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

  • Top Five Strategies for Getting an Email Archiving Project off the Ground

    Sponsored by: Symantec Corporation

    Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of an email archiving system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.