Email Security Research
-
Maximizing Business Email Security in Gmail
Sponsored by: TechTarget SecurityThis e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
-
Considerations and Best Practices for Updating a Corporate BYOD Program
Sponsored by: TechTarget SecurityIn this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
-
Exchange Server: E-mail Archiving and Security
Sponsored by: TechTarget SecurityReview today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
-
Securing Data, Not Endpoints: The Best Way to Control Consumerization
Sponsored by: TechTarget SecurityDiscover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
-
MDM Software: Benefits of Mobile Configuration Management
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
-
Mobile Data Security and Compliance Challenges in the Enterprises
Sponsored by: TechTarget SecurityThe bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.
-
Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
Sponsored by: TechTarget SecurityThis essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
-
About to Buy Guide: Spam/virus protection for Exchange
Sponsored by: TechTarget SecurityThis expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
-
Expert ways to maximize security in Exchange
Sponsored by: TechTarget Data CenterThis expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
-
Cloud Content Security: Understanding SaaS data protection
Sponsored by: TechTarget SecurityThis expert e-guide examines the growing trend of SaaS security, or cloud-based security services. Learn about the pros and cons of adopting SaaS security in your organization.
-
Expert E-zine: Who has access to your email?
Sponsored by: TechTarget SecurityIn this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.
-
How to prevent phishing attacks: User awareness and training
Sponsored by: TechTarget SecurityThis expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
-
E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
Sponsored by: TechTarget Data CenterThis chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
-
Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
Sponsored by: TechTarget SecurityWith more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
-
Email Security Technical Guide
Sponsored by: TechTarget SecurityCheck out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
-
Secure File Transfer Tech Guide
Sponsored by: TechTarget SecurityRead this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
-
Six Email Security Best Practices for Email SaaS
Sponsored by: Symantec CorporationUncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
-
Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
Sponsored by: Dell SoftwareAccess this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
-
e-Zine: Purchasing Considerations for Exchange 2010
Sponsored by: Dell EMC and MicrosoftFind out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade.
-
Best and Worst Practices for Exchange email archiving
Sponsored by: MetalogixIn this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.
-
CSC CloudMail for VMware Zimbra
Sponsored by: CSCMoving your messaging application to the cloud can help you lower TCO and increase integration by eliminating the need to maintain an in-house email system. Learn how you can enjoy a full suite of email, calendaring, sharing and document management abilities on any desktop or operating system with a cloud-based platform.
-
Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge
Sponsored by: Dell, Inc. and Intel®This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape.
-
Messaging and Web Security Best Practices for 2011 and Beyond
Sponsored by: GFI SoftwareThis paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
-
Securing Microsoft Exchange 2010 with VeriSign Authentication Services
Sponsored by: VeriSign EMEAThis guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
-
Best and worst practices for email archiving in Exchange Server
Sponsored by: Symantec CorporationEmail administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.