ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Research

  • Great Things Happen on the Road to Disaster Recovery

    Sponsored by: AppAssure Software, Inc.

    In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.

  • AppAssure makes Network Administrator "Hero of the Day"

    Sponsored by: AppAssure Software, Inc.

    Before implementing AppAssure's MailRetriever, Imagine's Exchange environment suffered unrecoverable corruption. During the ensuing downtime, the network administrators searched for a better backup solution. Imagine Schools now relies on MailRetriever for Exchange to backup Exchange, SQL servers, and school Web sites.

  • eBook: Software as a Service: What You Should Consider When Moving to SaaS

    Sponsored by: TechTarget Security

    Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

  • Total E-mail Security

    Sponsored by: Sunbelt Software

    Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.

  • Email Management Services (EMS™)

    Sponsored by: Dell MessageOne

    Email Management Services provide a total solution for email and BlackBerry® continuity, recovery, security, archiving, e-Discovery, and storage management.

  • What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange

    Sponsored by: BlackBerry

    View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.

  • Secure Enterprise e-mail Solutions with Microsoft® Exchange

    Sponsored by: OnX USA LLC

    This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.

  • A Guide to Evaluating Email Security Solutions

    Sponsored by: SonicWALL

    E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.

  • Advantages of Integrated Messaging Security

    Sponsored by: Symantec Corporation

    This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...

  • Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper

    Sponsored by: Symantec Corporation

    This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.

  • Top 5 IT Considerations for Secure Wireless Email

    Sponsored by: Sybase iAnywhere

    The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.

  • Email Security Eguide

    Sponsored by: Sunbelt Software

    Email security and spam only get more difficult to control as spammers get more sophisticated. Read this eGuide from SearchWindowsSecurity.com contributors to get a better understanding of just how big a threat spam is and what to do about it.

  • Symantec Mail Security for SMTP 5.0

    Sponsored by: Symantec Corporation

    This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...

  • Symantec Mail Security for SMTP

    Sponsored by: Symantec Corporation

    Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.

  • Exchange Server 2007 Design Considerations

    Sponsored by: DellEMC and IntelĀ®

    Migrating to Exchange Server 2007 needs careful considerations for configurations that affect availability or storage capabilities. This paper highlights Exchange 2007 deployment best practices, features and architectural benefits, server roles...

  • TOTSA Unearths Greater IT Efficiency with DYS CONTROL!™

    Sponsored by: Permessa Corporation (formerly DYS Analytics, Inc.)

    Messaging management, when deployed effectively, has the power to provide IT with knowledge regarding how many messages have been delivered, system measurements and cost allocation. Learn about an email management system that provides these...

  • Zurich Financial Services Runs Messaging & Collaboration as a Business with DYS CONTROL!™

    Sponsored by: Permessa Corporation (formerly DYS Analytics, Inc.)

    Usage-based cost-allocation has become increasingly popular for organizations looking to change their accounting methods for the way IT usage is charged. Learn about an effective and accurate solution to measure messaging usage.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: Symantec Corporation

    This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.

  • Enterprise Messaging Security and Management

    Sponsored by: Symantec Corporation

    Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...

  • Microsoft Forefront Security for Exchange Server Beta

    Sponsored by: Microsoft

    Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.

  • Best Practices for Protecting Microsoft Exchange

    Sponsored by: Symantec Corporation

    The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.

  • Why Bayesian Filtering Is the Most Effective Anti-spam Technology

    Sponsored by: GFI Software

    This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.

  • Why You Need an Email Exploit Detection Engine

    Sponsored by: GFI Software

    This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.

  • Why One Virus Engine Is Not Enough

    Sponsored by: GFI Software

    This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.

  • Sophos Email Security Appliances

    Sponsored by: Sophos

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.