Email Security Research
-
Creating and Enforcing Email Security Policies
Sponsored by: SearchSecurity.comThis expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
-
Webmail Forensics: Investigating Issues with Email Forwarding Security
Sponsored by: SearchSecurity.comIn this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
-
Secure Mobile Email for the Lean IT Department
Sponsored by: Shavlik TechnologiesThis expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
-
Improve Enterprise Email Systems with HP Messaging Services
Sponsored by: Hewlett-Packard EnterpriseFind out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
-
Network Protection and UTM Buyer's Guide
Sponsored by: SophosThis white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Voltage Success Story: Envision Pharmaceutical Services
Sponsored by: Voltage Security, Inc.This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
Consultants: How Can You Secure Your Information with Customers?
Sponsored by: GlobalscapeThis case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
-
How to Limit the Risk of Attack on your XP Assets
Sponsored by: AT&T CybersecurityThis webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
-
Internet Security Threat Report - 2014
Sponsored by: Symantec CorporationThis in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
-
Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD
Sponsored by: ZixCorpThis expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.
-
Cloud Efficiencies and Hosted Email
Sponsored by: ApptixThis whitepaper covers some information about cloud computing and dispels some myths about hosted Exchange email.
-
Cisco Email Security
Sponsored by: CiscoThis informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
-
Advanced Malware Protection for your Web and Email Gateways
Sponsored by: Cisco Systems, Inc.This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoThis exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
-
Advanced Malware Protection for your Email Services
Sponsored by: Cisco Systems, Inc.This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
-
Policy Based Encryption: Protecting your Business Against Email Risks
Sponsored by: ApptixThis white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoAccess this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
-
Discover How Mail Express Solves 2 of Your Biggest IT Headaches
Sponsored by: GlobalscapeMail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
-
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
Sponsored by: FireEyeWith cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
-
Who’s Snooping on Your Email?
Sponsored by: SophosThis exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
-
Bloomberg Personal Vault
Sponsored by: BloombergAccess this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
-
Best Practices for Secure Email Policy and Compliance
Sponsored by: AxwayAccess this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.